Category: CyberDefenseMagazine
Shadow APIs (Application Programming Interfaces) are now the biggest threat facing API security today. Analysis of more than 20 billion…
Strong IGA as a strong foundation for Zero Trust Architecture A colleague and I recently had a discussion of Zero…
Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…
Name: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role…
Name: Hans Christian Rudolph Affiliation: Deloitte Tohmatsu Cyber Editor of Cybersecurity Magazine Can you briefly introduce your current role in…
All over the world, DDoS attacks are getting more frequent and last longer, too. We’re officially sailing in rough water….
Name: Tom Madsen Affiliation: Cybersecurity SME with NNIT Denmark Editorial Board of Cybersecurity Magazine Can you briefly introduce your current…
Where you choose to base your SOC physically is a crucial yet underappreciated decision. By Nicola Hartland, Senior VP, Falanx…
By 2025, Gartner estimates that over 95% of new digital workloads will be deployed on cloud-native platforms, up from 30%…
By Damien Philippon, Founder, Zelros Getting a job is already hard enough. And for the 1 in 4 Americans who…
Name: Sonia Compans Affiliation: Technical Officer at ETSI Can you briefly introduce your current role in cybersecurity? I’m the point…
In the last few years, many large businesses have overhauled their approach to cyber security. The rise of remote working…