Category: CyberDefenseMagazine

Largest Data Breaches of 2022 - Protect Data with Deep Packet Inspection
28
Dec
2022

Largest Data Breaches Of 2022 – Protect Data With Deep Packet Inspection

By Randy Reiter CEO of Don’t Be Breached There were many massive Data Breaches in 2022. Don’t be a member…

Print Friendly, PDF & Email
26
Dec
2022

Attacks on Shadow APIs Loom Large

Shadow APIs (Application Programming Interfaces) are now the biggest threat facing API security today. Analysis of more than 20 billion…

Print Friendly, PDF & Email
26
Dec
2022

How Do You Know That Access Was Granted in the First Place?

Strong IGA as a strong foundation for Zero Trust Architecture A colleague and I recently had a discussion of Zero…

Print Friendly, PDF & Email
26
Dec
2022

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…

Career Profile: Anand Prasad, Deloitte
26
Dec
2022

Career Profile: Anand Prasad, Deloitte

Name: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role…

Career Profile: Hans Christian Rudolph, Deloitte
26
Dec
2022

Career Profile: Hans Christian Rudolph, Deloitte

Name: Hans Christian Rudolph Affiliation: Deloitte Tohmatsu Cyber Editor of Cybersecurity Magazine Can you briefly introduce your current role in…

Print Friendly, PDF & Email
26
Dec
2022

10 Steps for Better Website DDoS Protection

All over the world, DDoS attacks are getting more frequent and last longer, too. We’re officially sailing in rough water….

Career Profile: Tom Madsen, NNIT Denmark
26
Dec
2022

Career Profile: Tom Madsen, NNIT Denmark

Name: Tom Madsen Affiliation: Cybersecurity SME with NNIT Denmark Editorial Board of Cybersecurity Magazine Can you briefly introduce your current…

A Local Solution to A Global Problem: Why Cyber Security Operation Centres Should Be UK Based
26
Dec
2022

A Local Solution to A Global Problem: Why Cyber Security Operation Centres Should Be UK Based

Where you choose to base your SOC physically is a crucial yet underappreciated decision. By Nicola Hartland, Senior VP, Falanx…

The Power of eBPF for Cloud Native Systems
26
Dec
2022

The Power of eBPF for Cloud Native Systems

By 2025, Gartner estimates that over 95% of new digital workloads will be deployed on cloud-native platforms, up from 30%…

Biased Artificial Intelligence Is Costing People Job Opportunities, And Much More
26
Dec
2022

Biased Artificial Intelligence Is Costing People Job Opportunities, And Much More

By Damien Philippon, Founder, Zelros Getting a job is already hard enough. And for the 1 in 4 Americans who…

Career Profile: Sonia Compans, Technical Officer at ETSI
26
Dec
2022

Career Profile: Sonia Compans, Technical Officer at ETSI

Name: Sonia Compans Affiliation: Technical Officer at ETSI Can you briefly introduce your current role in cybersecurity? I’m the point…