Category: CyberDefenseMagazine

Eight Tips for CISOs Trying Get Their Board on Board
28
Mar
2023

Eight Tips for CISOs Trying Get Their Board on Board

By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role…

Next Generation Cybersecurity for Small to Midsize Businesses
28
Mar
2023

Next Generation Cybersecurity for Small to Midsize Businesses

How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced…

Zero Trust in a DevOps World
26
Mar
2023

Zero Trust in a DevOps World

By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical…

Why tackling financial crime calls for a privacy-first approach
25
Mar
2023

Why Tackling Financial Crime Calls for A Privacy-First Approach

By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial…

Why You Can
24
Mar
2023

Why You Can’t Have True Zero Trust Without API Security

By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason….

Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms
24
Mar
2023

Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms

Abstract: The involvement of the Internet in the production of daily life has increased the demand for the security of…

The WAN Under Siege
23
Mar
2023

The WAN Under Siege – Cyber Defense Magazine

WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats…

Stop Backing Up Ransomware
23
Mar
2023

Stop Backing Up Ransomware – Cyber Defense Magazine

By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for…

There’s no way you’re still using Consumer Messaging Apps for Business
23
Mar
2023

There’s no way you’re still using Consumer Messaging Apps for Business

By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they…

Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
22
Mar
2023

Top 5 Questions to Ask When You’re Building a Cloud Security Strategy

By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the…

Vulnerability Prioritization is Not a One-Size Fits All Approach
22
Mar
2023

Vulnerability Prioritization is Not a One-Size Fits All Approach

By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging…

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
22
Mar
2023

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future

By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight…