Category: CyberDefenseMagazine

Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
10
Apr
2023

Organizations Have Security Priorities Mismatched as Breaches Continue to Rise

By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the…

The Practical Side of ZTNA: How it Helps Harden Defenses
10
Apr
2023

The Practical Side of ZTNA: How it Helps Harden Defenses

By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the…

Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
08
Apr
2023

Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework

By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged…

Using OAuth2 to Secure Your APIs
07
Apr
2023

Using OAuth2 to Secure Your APIs

APIs (Application Programming Interfaces) are gradually becoming critical aspects of software interaction and integration over the internet, allowing fast and…

Cloud Visibility and Port Spoofing: the “Known Unknown”
04
Apr
2023

Cloud Visibility and Port Spoofing: the “Known Unknown”

By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before…

A Question of Doubt
04
Apr
2023

A Question of Doubt – Cyber Defense Magazine

The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief…

Cybersecurity Strategies for SMEs in the Nordic Baltic Region
03
Apr
2023

Cybersecurity Strategies for SMEs in the Nordic Baltic Region

Abstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the…

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
31
Mar
2023

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.

By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable…

NIS2 and the chain liability’s impact on Secure Software Development
31
Mar
2023

NIS2 and the chain liability’s impact on Secure Software Development

If you are a software supplier and your customer is covered by the EU NIS2 directive, you might very well…

Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
30
Mar
2023

Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”

By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries,…

Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
30
Mar
2023

Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there

Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
30
Mar
2023

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to…