Category: CyberDefenseMagazine

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
04
Feb
2024

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines

SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the…

Striking The Right Balance: Cloud and Cyber Priorities for SMEs
04
Feb
2024

Striking The Right Balance: Cloud and Cyber Priorities for SMEs

By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face…

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
02
Feb
2024

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM

By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
02
Feb
2024

Best Practices for Implementing Threat Intelligence in Industrial Control Systems 

It has become clear industrial control systems (ICS) lack essential defenses. In the face of an ever-evolving threat landscape, cyber threat…

Protecting Critical Infrastructure from Cyber Attack
01
Feb
2024

Protecting Critical Infrastructure from Cyber Attack

The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary,…

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
01
Feb
2024

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead

By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…

Ditch the Worry – Switch to Secure WhatsApp Alternative
01
Feb
2024

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it…

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity
30
Jan
2024

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
30
Jan
2024

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…

Protecting Your Business and Personal Data
30
Jan
2024

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public…

Navigating Secure Adoption of AI Across Government and Connected Infrastructure
30
Jan
2024

Navigating Secure Adoption of AI Across Government and Connected Infrastructure

By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and…

North Korea–Russia Summit - Cyber Defense Magazine
30
Jan
2024

North Korea–Russia Summit – Cyber Defense Magazine

A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong…