Category: CyberDefenseMagazine

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
22
Mar
2023

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future

By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight…

22
Mar
2023

Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers

By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the…

Cybersecurity and Digital Transformation: Busting the Myths
20
Mar
2023

Cybersecurity and Digital Transformation: Busting the Myths

It’s -30 Celsius in December. An entire city has gone dark. There is no electricity, heating, internet, or telecommunications—all because…

Solving The AppSec Dilemma Across the Entire SDLC
19
Mar
2023

Solving The AppSec Dilemma Across the Entire SDLC

Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security…

The Biggest Cyber Threats For The Financial Industry In 2023
19
Mar
2023

The Biggest Cyber Threats For The Financial Industry In 2023

By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in…

The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly
18
Mar
2023

The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly

By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy…

The Impact of Mobile Threats on SMBs
18
Mar
2023

“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”

By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world…

Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models
17
Mar
2023

Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models

Abstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of…

Passwordless: Fact Versus Fiction
16
Mar
2023

Passwordless: Fact Versus Fiction – Cyber Defense Magazine

By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause,…

Securing Collaboration at the Speed of Business
16
Mar
2023

Securing Collaboration at the Speed of Business

By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is…

Sell tickets to Fans, Not to Bots.
16
Mar
2023

Sell tickets to Fans, Not to Bots.

By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase…

Product Review of SpecOps Password Policy
14
Mar
2023

Product Review of SpecOps Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this…