Category: CyberDefenseMagazine

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
28
Jan
2024

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on…

Developers Hold the New Crown Jewels. Are They Properly Protected?
26
Jan
2024

Developers Hold the New Crown Jewels. Are They Properly Protected?

By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the…

Expect to Fail: How Organizations Can Benefit from a Breach
26
Jan
2024

Expect to Fail: How Organizations Can Benefit from a Breach

By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…

How to Create a Threat Hunting Program for Your Business
26
Jan
2024

How to Create a Threat Hunting Program for Your Business

By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…

How To Improve Security Capacities of The Internet of Things?
26
Jan
2024

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….

Cybersecurity in Digital Afterlife
24
Jan
2024

Cybersecurity in Digital Afterlife – Cyber Defense Magazine

Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is…

When the Enemy Is DDoS, Holistic Protection Is a Must
24
Jan
2024

When the Enemy Is DDoS, Holistic Protection Is a Must

An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional…

keeping saas data under wraps
24
Jan
2024

Keeping SaaS Data Under Wraps

A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…

Data Sanitization for End-Of-Use Assets
24
Jan
2024

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe…

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
24
Jan
2024

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital…

Is the cyber security sector unprepared for AI?
23
Jan
2024

Is the cyber security sector unprepared for AI?

Generative AI has taken the world by storm but there’s still some confusion over its applicability in a cyber security context…

Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services
22
Jan
2024

Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services

By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually –…