Category: CyberDefenseMagazine

How Does a Botnet Attack Work?
24
Jan
2023

How Does a Botnet Attack Work?

By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily….

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
24
Jan
2023

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a…

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering
23
Jan
2023

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…

How 5G Networks Are Secured and Enabled By SASE
22
Jan
2023

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and…

The Rise in Cyber-Attacks from Bad International Actors
20
Jan
2023

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from…

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks
20
Jan
2023

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks

A comprehensive cybersecurity strategy involves data recovery now more than ever. A solid plan could save organizations from the most…

Doenerium: When Stealing from Thieves Is Also a Crime
18
Jan
2023

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat…

five-ways-to-keep-endpoint-protection-simple
18
Jan
2023

Five Ways to Keep Endpoint Protection Simple

By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve….

5 Email Security Threats That Are a Cause For Concern
16
Jan
2023

5 Email Security Threats That Are a Cause For Concern

In the wake of sophisticated and expensive network security measures, protecting the lowly email server often gets missed. However, attackers…

DevSecOps and Digital Transformation
15
Jan
2023

DevSecOps and Digital Transformation: Bridging the Security Gap

How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to…

13
Jan
2023

Why Defensive Superiority Should Rein Over Offensive Capability

By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations…

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
13
Jan
2023

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face…