Category: CyberDefenseMagazine

Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers
20
Jan
2024

Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers

By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original…

Common Pitfalls of Running On-Premises SIEM Solutions
20
Jan
2024

Common Pitfalls of Running On-Premises SIEM Solutions

By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking…

Inside job: How the cause of data breaches has shifted
18
Jan
2024

Inside job: How the cause of data breaches has shifted

Humans are often regarded as the weakest link in the security chain but it would appear attempts to mitigate the threat seem to be…

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
18
Jan
2024

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity

By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These…

Managing without governing? Why your organization needs a management system to govern your information resilience program
18
Jan
2024

Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are…

ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections
18
Jan
2024

ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections

Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu…

Cybersecurity Awareness Month: The Overlooked Importance of API Security
17
Jan
2024

Breaches happen. Stop the Blame Game, and Foster Transparency

No-one wants to suffer a data breach and the potential havoc it can wreak. Unfortunately, there is a strong tendency…

The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace
16
Jan
2024

The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace

By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless –…

How To Combat the Mounting ‘Hacktivist’ Threat
15
Jan
2024

How To Combat the Mounting ‘Hacktivist’ Threat

By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less…

OT Cybersecurity: Safeguarding Building Operations in a Digitized World
15
Jan
2024

OT Cybersecurity: Safeguarding Building Operations in a Digitized World

By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has…

7 Steps to Build a Defense in Depth Strategy for Your Home
13
Jan
2024

7 Steps to Build a Defense in Depth Strategy for Your Home

By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense…

Zombie APIs: The Scariest Threat Lurking in The Shadows?
13
Jan
2024

Zombie APIs: The Scariest Threat Lurking in The Shadows?

By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles,…