Category: CyberDefenseMagazine

Cybersecurity in Digital Afterlife
24
Jan
2024

Cybersecurity in Digital Afterlife – Cyber Defense Magazine

Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is…

When the Enemy Is DDoS, Holistic Protection Is a Must
24
Jan
2024

When the Enemy Is DDoS, Holistic Protection Is a Must

An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional…

keeping saas data under wraps
24
Jan
2024

Keeping SaaS Data Under Wraps

A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…

Data Sanitization for End-Of-Use Assets
24
Jan
2024

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe…

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
24
Jan
2024

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital…

Is the cyber security sector unprepared for AI?
23
Jan
2024

Is the cyber security sector unprepared for AI?

Generative AI has taken the world by storm but there’s still some confusion over its applicability in a cyber security context…

Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services
22
Jan
2024

Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services

By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually –…

Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers
20
Jan
2024

Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers

By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original…

Common Pitfalls of Running On-Premises SIEM Solutions
20
Jan
2024

Common Pitfalls of Running On-Premises SIEM Solutions

By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking…

Inside job: How the cause of data breaches has shifted
18
Jan
2024

Inside job: How the cause of data breaches has shifted

Humans are often regarded as the weakest link in the security chain but it would appear attempts to mitigate the threat seem to be…

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
18
Jan
2024

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity

By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These…

Managing without governing? Why your organization needs a management system to govern your information resilience program
18
Jan
2024

Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are…