Category: CyberDefenseMagazine
By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber…
Cyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most businesses today…
By Dan Richings, Senior Vice President Product Management, Adaptiva The average enterprise organization has thousands of endpoint devices, ranging from…
Well-implemented fraud prevention measures can ensure your business thrives today and is future proof for tomorrow. By Patrick Kelly, Americas…
By Zac Amos, Features Editor, ReHack Businesses must leverage various types of information as the world becomes increasingly digital and…
By Randy Reiter CEO of Don’t Be Breached There were many massive Data Breaches in 2022. Don’t be a member…
Shadow APIs (Application Programming Interfaces) are now the biggest threat facing API security today. Analysis of more than 20 billion…
Strong IGA as a strong foundation for Zero Trust Architecture A colleague and I recently had a discussion of Zero…
Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…
Name: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role…
Name: Hans Christian Rudolph Affiliation: Deloitte Tohmatsu Cyber Editor of Cybersecurity Magazine Can you briefly introduce your current role in…