Category: CyberDefenseMagazine
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the…
By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals…
By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is…
By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and…
By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity…
Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is…
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…
By Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing their…
By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the…
AR can help facility managers optimize, expand, maintain and secure data center infrastructure. As demand for data centers grows, IT…
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…