Category: CyberDefenseMagazine
By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the…
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as…
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially…
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating…
By Scott Gerlach, CSO – StackHawk The accelerated demand for software applications and application programming interfaces (APIs) across industries has…
Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly…
The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant…
By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding…
The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke…
Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my…
By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication…
By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of…











