Category: CyberDefenseMagazine

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
13
Jan
2023

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face…

Career Profile: Dr. Silke Holtmanns, PwC Finland
13
Jan
2023

Career Profile: Dr. Silke Holtmanns, PwC Finland

Name: Dr. Silke Holtmanns Affiliation: PwC Finland – 5G Security Team Can you briefly introduce your current role in cybersecurity?…

Applying the NIST Framework to Ransomware Risk Management
11
Jan
2023

Applying the NIST Framework to Ransomware Risk Management

Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief…

Compliance Is the Key to Unlocking Government Contractor Success
10
Jan
2023

Compliance Is the Key to Unlocking Government Contractor Success

By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into…

Why a Picture Is Worth a Thousand Files
09
Jan
2023

Why a Picture Is Worth a Thousand Files

The world is a visual place. Communication with photos and short videos has now become commonplace thanks to applications like…

Cyber Threats Driving Insurance Claims Activity
09
Jan
2023

Cyber Threats Driving Insurance Claims Activity

By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate…

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
09
Jan
2023

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home…

Automated Patch Management Can Protect Your Business from A Data Disaster
07
Jan
2023

Automated Patch Management Can Protect Your Business from A Data Disaster

By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For…

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
07
Jan
2023

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it…

Applying UX Design To Cybersecurity
06
Jan
2023

Applying UX Design To Cybersecurity

If there’s one thing businesses should always focus on, it’s user experience (UX). If users aren’t having a good experience…

5 Ways to Protect Your Workplace from Cybersecurity Threats
05
Jan
2023

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability…

What is a mobile possession factor – and how can it replace passwords to stop phishing?
05
Jan
2023

What is a mobile possession factor – and how can it replace passwords to stop phishing?

By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means…