Category: CyberDefenseMagazine

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector
30
Dec
2022

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector

By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…

Halting Hackers on the Holidays
28
Dec
2022

Halting Hackers on the Holidays

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber…

Dark Clouds Could Be Looming
28
Dec
2022

Dark Clouds Could Be Looming

Cyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most businesses today…

Endpoint Security on the Edge
28
Dec
2022

Endpoint Security on the Edge

By Dan Richings, Senior Vice President Product Management, Adaptiva The average enterprise organization has thousands of endpoint devices, ranging from…

Fraud Prevention Tips for Online Businesses
28
Dec
2022

Fraud Prevention Tips for Online Businesses

Well-implemented fraud prevention measures can ensure your business thrives today and is future proof for tomorrow. By Patrick Kelly, Americas…

Zac Amos Author
28
Dec
2022

Tips to Recover from a Data Center Failure

By Zac Amos, Features Editor, ReHack Businesses must leverage various types of information as the world becomes increasingly digital and…

Largest Data Breaches of 2022 - Protect Data with Deep Packet Inspection
28
Dec
2022

Largest Data Breaches Of 2022 – Protect Data With Deep Packet Inspection

By Randy Reiter CEO of Don’t Be Breached There were many massive Data Breaches in 2022. Don’t be a member…

Print Friendly, PDF & Email
26
Dec
2022

Attacks on Shadow APIs Loom Large

Shadow APIs (Application Programming Interfaces) are now the biggest threat facing API security today. Analysis of more than 20 billion…

Print Friendly, PDF & Email
26
Dec
2022

How Do You Know That Access Was Granted in the First Place?

Strong IGA as a strong foundation for Zero Trust Architecture A colleague and I recently had a discussion of Zero…

Print Friendly, PDF & Email
26
Dec
2022

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…

Career Profile: Anand Prasad, Deloitte
26
Dec
2022

Career Profile: Anand Prasad, Deloitte

Name: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role…

Career Profile: Hans Christian Rudolph, Deloitte
26
Dec
2022

Career Profile: Hans Christian Rudolph, Deloitte

Name: Hans Christian Rudolph Affiliation: Deloitte Tohmatsu Cyber Editor of Cybersecurity Magazine Can you briefly introduce your current role in…