Category: CyberDefenseMagazine
By Dave Adamson, Chief Technology Officer at EspriaEncourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the…
By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network…
Firmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –…
By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming…
What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at…
By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall,…
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a…
General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant,…
The supply chain sector has always been a magnet for theft and fraud, but these risks multiply in the age…
Analysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext…
By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries….
The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources…