Category: CyberDefenseMagazine

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
02
Feb
2024

Best Practices for Implementing Threat Intelligence in Industrial Control Systems 

It has become clear industrial control systems (ICS) lack essential defenses. In the face of an ever-evolving threat landscape, cyber threat…

Protecting Critical Infrastructure from Cyber Attack
01
Feb
2024

Protecting Critical Infrastructure from Cyber Attack

The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary,…

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
01
Feb
2024

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead

By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…

Ditch the Worry – Switch to Secure WhatsApp Alternative
01
Feb
2024

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it…

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity
30
Jan
2024

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
30
Jan
2024

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…

Protecting Your Business and Personal Data
30
Jan
2024

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public…

Navigating Secure Adoption of AI Across Government and Connected Infrastructure
30
Jan
2024

Navigating Secure Adoption of AI Across Government and Connected Infrastructure

By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and…

North Korea–Russia Summit - Cyber Defense Magazine
30
Jan
2024

North Korea–Russia Summit – Cyber Defense Magazine

A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong…

In Pursuit of a Passwordless Future
28
Jan
2024

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry…

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
28
Jan
2024

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted…

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
28
Jan
2024

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…