Category: CyberDefenseMagazine

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
06
Feb
2024

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech…

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
06
Feb
2024

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits…

The Crumbling Castle
04
Feb
2024

The Crumbling Castle – Cyber Defense Magazine

By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy…

The Cybersecurity Bridge: A Necessary Connection for IT and Communications
04
Feb
2024

The Cybersecurity Bridge: A Necessary Connection for IT and Communications

By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and…

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
04
Feb
2024

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines

SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the…

Striking The Right Balance: Cloud and Cyber Priorities for SMEs
04
Feb
2024

Striking The Right Balance: Cloud and Cyber Priorities for SMEs

By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face…

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
02
Feb
2024

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM

By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
02
Feb
2024

Best Practices for Implementing Threat Intelligence in Industrial Control Systems 

It has become clear industrial control systems (ICS) lack essential defenses. In the face of an ever-evolving threat landscape, cyber threat…

Protecting Critical Infrastructure from Cyber Attack
01
Feb
2024

Protecting Critical Infrastructure from Cyber Attack

The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary,…

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
01
Feb
2024

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead

By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…

Ditch the Worry – Switch to Secure WhatsApp Alternative
01
Feb
2024

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it…

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity
30
Jan
2024

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…