Category: CyberDefenseMagazine

Ai, Cybersecurity Awareness, And Communication
09
Feb
2024

Ai, Cybersecurity Awareness, And Communication

Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE…

Addressing Bias in Insider Risk Monitoring
09
Feb
2024

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often…

Addressing the Particular Cybersecurity Challenge of Discrete Manufacturing
08
Feb
2024

Addressing the Particular Cybersecurity Challenge of Discrete Manufacturing

By Dave Purdy, Regional Vice President of Sales, North America, TXOne Networks Though it’s often treated as a borrowed approach…

AI in DevSecOps:  Moving from A Co-Pilot to An Autopilot
08
Feb
2024

AI in DevSecOps: Moving from A Co-Pilot to An Autopilot

By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At…

Be prepared: the 3 top cyberthreats for 2024
08
Feb
2024

Be prepared: the 3 top cyberthreats for 2024

In today’s fast-evolving cybersecurity environment, being aware of upcoming threats on the horizon is crucial for informing the preparations and…

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
08
Feb
2024

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
08
Feb
2024

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users

Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at…

AI: The Human Touch in Cybersecurity Recruitment
08
Feb
2024

AI: The Human Touch in Cybersecurity Recruitment

Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where…

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
08
Feb
2024

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors

A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out…

The Tech Jobs That AI Will Not Disrupt
06
Feb
2024

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world…

A Guide to Affordable Cybersecurity Protection for Your Small Business
06
Feb
2024

A Guide to Affordable Cybersecurity Protection for Your Small Business

There exists an age-old battle between the two sides of the software development industry. On one, there are the white…

3 New Risks That CISOs Will Face in 2024
06
Feb
2024

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere…