Cybersecurity in Digital Afterlife – Cyber Defense Magazine
Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is not merely theoretical; it is…
Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is not merely theoretical; it is…
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and…
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t…
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as…
Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and…
Generative AI has taken the world by storm but there’s still some confusion over its applicability in a cyber security context and the extent to which…
By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually – a figure which is growing…
By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast…
By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment.…
Humans are often regarded as the weakest link in the security chain but it would appear attempts to mitigate the threat seem to be having little effect. In fact, the insider threat…
By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These applications need to be built,…
SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are missing the fact that while…