Category: CyberDefenseMagazine

Innovator Spotlight: LastPass
16
Sep
2025

Innovator Spotlight: LastPass – Cyber Defense Magazine

LastPass Evolves Secure Access Experiences to Combat Shadow IT and AI Risks for CISOs Picture your organization humming along, with…

Digital Transformation Failures: A National Security Crisis in the Making
16
Sep
2025

Digital Transformation Failures: A National Security Crisis in the Making

In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations…

Preparing for the EU’s DORA amidst Technical Controls Ambiguity
15
Sep
2025

Preparing for the EU’s DORA amidst Technical Controls Ambiguity

The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act…

Print Friendly, PDF & Email
15
Sep
2025

Governance Gaps: How Weak Data Policies Invite AI-Driven Ransomware

In today’s digital economy, data is often described as “the new oil” because of its role in fueling artificial intelligence…

Beyond Buzzwords: The Real Impact of AI on Identity Security
15
Sep
2025

Beyond Buzzwords: The Real Impact of AI on Identity Security

Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to…

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
15
Sep
2025

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets

Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a…

A CISO’s Guide to Managing Cyber Risk in Healthcare
13
Sep
2025

A CISO’s Guide to Managing Cyber Risk in Healthcare

Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the…

Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical
13
Sep
2025

Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical

The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools…

The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats
12
Sep
2025

The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats

Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical…

Ransomware Tactics Are Shifting. Here’s How to Keep Up
12
Sep
2025

Ransomware Tactics Are Shifting. Here’s How to Keep Up

It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across…

12 Ways to Protect Your Business from Hackers During Remote Work
11
Sep
2025

12 Ways to Protect Your Business from Hackers During Remote Work

Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025….

Boost Operational Resilience: Proactive Security with CORA Best Practices
11
Sep
2025

Boost Operational Resilience: Proactive Security with CORA Best Practices

On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks,…