Category: CyberDefenseMagazine

How The Security of The Cloud’s Supply Chain Will Shift in 2024
21
Feb
2024

How The Security of The Cloud’s Supply Chain Will Shift in 2024

What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at…

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security
21
Feb
2024

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security

By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed…

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024
21
Feb
2024

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024

By Yiyi Miao, Chief Product Officer, OPSWAT In the ever-changing domain of cybersecurity, organizations continue to face multifaceted challenges with…

Unlocking Security: A Deep Dive into Zero-Trust Architecture
21
Feb
2024

Unlocking Security: A Deep Dive into Zero-Trust Architecture

Tom Madsen’s upcoming book, “Zero-trust – An Introduction,” offers readers a comprehensive guide to implementing and managing a zero-trust architecture…

Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
17
Feb
2024

Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization

By Ian Robinson, Chief Architect of Titania Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is vital to national…

How Businesses Can Manage Cryptocurrency Fraud
17
Feb
2024

How Businesses Can Manage Cryptocurrency Fraud

With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter…

It’s Time to End the Myth of Untouchable Mainframe Security.
17
Feb
2024

It’s Time to End the Myth of Untouchable Mainframe Security.

By Al Saurette, CEO, MainTegrity, Most large organizations, including 70% of Fortune 500 companies, rely extensively on mainframes for managing…

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition
17
Feb
2024

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition

By Omer Singer, VP of Strategy, Anvilogic The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for…

Cyber Insurance:  A Smart Investment to Protect Your Business from Cyber Threats in 2023
16
Feb
2024

Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023

Don’t wait until it’s too late – get cyber insurance today and secure your business for tomorrow. By Zia Muhammad,…

Cyber Resilience – Beyond Cyber Security
16
Feb
2024

Cyber Resilience – Beyond Cyber Security

In a world where 100% security is not possible, we need to be resilient as we strive to be secure….

an-interview-with-jeffrey-stephens-author
15
Feb
2024

An Interview With Jeffrey Stephens

🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻…

Exploring How Vulnerability Puts You at Risk on Valentine’s Day
15
Feb
2024

Exploring How Vulnerability Puts You at Risk on Valentine’s Day

According to Netskope’s latest “Year in Review” Cloud and Threat Report, social engineering was the primary method cyber attackers utilized to infiltrate organizations…