Category: CyberDefenseMagazine

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
30
Jan
2024

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…

Protecting Your Business and Personal Data
30
Jan
2024

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public…

Navigating Secure Adoption of AI Across Government and Connected Infrastructure
30
Jan
2024

Navigating Secure Adoption of AI Across Government and Connected Infrastructure

By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and…

North Korea–Russia Summit - Cyber Defense Magazine
30
Jan
2024

North Korea–Russia Summit – Cyber Defense Magazine

A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong…

In Pursuit of a Passwordless Future
28
Jan
2024

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry…

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
28
Jan
2024

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted…

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
28
Jan
2024

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
28
Jan
2024

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on…

Developers Hold the New Crown Jewels. Are They Properly Protected?
26
Jan
2024

Developers Hold the New Crown Jewels. Are They Properly Protected?

By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the…

Expect to Fail: How Organizations Can Benefit from a Breach
26
Jan
2024

Expect to Fail: How Organizations Can Benefit from a Breach

By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…

How to Create a Threat Hunting Program for Your Business
26
Jan
2024

How to Create a Threat Hunting Program for Your Business

By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…

How To Improve Security Capacities of The Internet of Things?
26
Jan
2024

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….