Category: CyberDefenseMagazine

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM
18
Mar
2024

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding…

Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents
17
Mar
2024

Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke…

Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary
17
Mar
2024

Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my…

What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future
16
Mar
2024

What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication…

How Cloud Solutions Can Lead to Stronger, More Secure IT Operations
16
Mar
2024

How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of…

Addressing Bias in Insider Risk Monitoring
15
Mar
2024

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often…

Unlocking Security: A Deep Dive into Zero-Trust Architecture
14
Mar
2024

Confidential data should stay… confidential – Cybersecurity Magazine

In October 2023 the Copenhagen based chain of real estate agents, EDC, was hit by a ransomware attack. The hackers behind the attack – the…

How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry
13
Mar
2024

How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By…

Building Cyber Resilience: Key Trends and Strategies for a Secure Future
12
Mar
2024

Building Cyber Resilience: Key Trends and Strategies for a Secure Future

Join us for an interview with Darren Thomson, Field Chief Technology Officer at Commvault, as we delve into the dynamic…

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
11
Mar
2024

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more…

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
11
Mar
2024

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics…

The Balancing Act for Mid-Market Firms:  Navigating Digital Growth and Security Hurdles
11
Mar
2024

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market…