Category: CyberDefenseMagazine

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing
12
Jan
2024

How businesses can mitigate risks and uphold compliance in 2024

Managing data privacy and compliance risks is becoming increasingly difficult year on year for businesses. Cybercriminals continue to evolve their…

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
11
Jan
2024

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery…

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
11
Jan
2024

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense

By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our…

User credentials are by far the best hack
09
Jan
2024

Startling Intellectual Property Theft Insights Every CISO Should Know

In an era where information is as valuable as currency, intellectual property (IP) theft has emerged as a silent yet formidable threat…

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
09
Jan
2024

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns

Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations…

Bolster an Organizational Cybersecurity Strategy with External Data Privacy
09
Jan
2024

Bolster an Organizational Cybersecurity Strategy with External Data Privacy

Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole…

An Age-by-Age Guide to Online Safety for Kids
07
Jan
2024

An Age-by-Age Guide to Online Safety for Kids

By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play,…

Your #1 Security Initiative in 2024 Should be Operational Resilience
07
Jan
2024

Your #1 Security Initiative in 2024 Should be Operational Resilience

The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As…

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
07
Jan
2024

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds

Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for…

Artificial Deception: The State Of “AI” In Defense and Offense
05
Jan
2024

Artificial Deception: The State Of “AI” In Defense and Offense

By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the…

Master Security by Building on Compliance with A Risk-Centric Approach
05
Jan
2024

Master Security by Building on Compliance with A Risk-Centric Approach

By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led…

Charting a Trustworthy AI Journey
05
Jan
2024

Charting a Trustworthy AI Journey

Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies…