Category: CyberDefenseMagazine

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
03
Feb
2023

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience

By Dave Adamson, Chief Technology Officer at EspriaEncourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the…

NetFlow’s Dirty Little Secret
03
Feb
2023

NetFlow’s Dirty Little Secret – Cyber Defense Magazine

By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network…

Trusted Computing - An Introductory Overview
03
Feb
2023

Trusted Computing – An Introductory Overview

Firmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –…

Secure APIs to Drive Digital Business
01
Feb
2023

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming…

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming
01
Feb
2023

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming

What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at…

Table Stakes Security Services for 2023
01
Feb
2023

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall,…

Moola Market Manipulation
30
Jan
2023

Moola Market Manipulation – Cyber Defense Magazine

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a…

Managing Cybersecurity for Critical National Infrastructure
28
Jan
2023

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant,…

4 Biggest Supply Chain Security Threats to Watch in 2023
27
Jan
2023

4 Biggest Supply Chain Security Threats to Watch in 2023

The supply chain sector has always been a magnet for theft and fraud, but these risks multiply in the age…

Remote Workers Face Growing Threats from Phishing Attacks
26
Jan
2023

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext…

Infrastructure-as-Code Security: a Critical Responsibility
26
Jan
2023

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries….

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
25
Jan
2023

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources…