Category: CyberDefenseMagazine
Technology is ever on the march to the future and with it comes more sophisticated and persistent cybercriminals.The digital arms…
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords….
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework…
Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker…
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The…
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By…
By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…