Category: CyberDefenseMagazine

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
07
Jan
2023

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it…

Applying UX Design To Cybersecurity
06
Jan
2023

Applying UX Design To Cybersecurity

If there’s one thing businesses should always focus on, it’s user experience (UX). If users aren’t having a good experience…

5 Ways to Protect Your Workplace from Cybersecurity Threats
05
Jan
2023

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability…

What is a mobile possession factor – and how can it replace passwords to stop phishing?
05
Jan
2023

What is a mobile possession factor – and how can it replace passwords to stop phishing?

By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means…

AI is the answer to modern cybersecurity threats
05
Jan
2023

AI Is the Answer To Modern Cybersecurity Threats

Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, OwlGaze With…

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It
03
Jan
2023

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day…

Zero Trust is More Than a Buzzword
03
Jan
2023

Zero Trust is More Than a Buzzword

Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva…

Data, Privacy, And the Future of Artificial Intelligence
03
Jan
2023

Data, Privacy, And the Future of Artificial Intelligence

By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central…

WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review
01
Jan
2023

WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review

By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies Every year, the WatchGuard Threat Labs team releases our annual cybersecurity predictions…

Cyber Defense Media Group – 11 Year Anniversary – Daily Celebration in 2023
01
Jan
2023

Cyber Defense Media Group – 11 Year Anniversary – Daily Celebration in 2023

IT’S A BIG, BOLD, BEAUTIFUL 2023 – OUR 11TH ANNIVERSARY  We’re celebrating this milestone every day this year in different,…

What we can learn from The Undeclared War
01
Jan
2023

What we can learn from The Undeclared War

By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, has continued…

Understanding how weaponized template injection attacks operate
30
Dec
2022

Understanding How Weaponized Template Injection Attacks Operate

By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…