Category: CyberDefenseMagazine
Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva…
By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central…
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies Every year, the WatchGuard Threat Labs team releases our annual cybersecurity predictions…
IT’S A BIG, BOLD, BEAUTIFUL 2023 – OUR 11TH ANNIVERSARY We’re celebrating this milestone every day this year in different,…
By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, has continued…
By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…
By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber…
Cyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most businesses today…
By Dan Richings, Senior Vice President Product Management, Adaptiva The average enterprise organization has thousands of endpoint devices, ranging from…
Well-implemented fraud prevention measures can ensure your business thrives today and is future proof for tomorrow. By Patrick Kelly, Americas…
By Zac Amos, Features Editor, ReHack Businesses must leverage various types of information as the world becomes increasingly digital and…