Category: CyberDefenseMagazine

Protect your business from the inside out with zero-trust security
04
Jan
2024

Technology, regulation and the human touch: three pointers to stop cyber-crime

Geopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising the stakes…

Understanding the Escalating Threat of Web DDoS Tsunami Attacks
03
Jan
2024

Understanding the Escalating Threat of Web DDoS Tsunami Attacks

By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms…

As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
03
Jan
2024

As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice

By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting With $54 trillion in payments flowing…

Why Continuous Training Must Come Before The AI-driven SDLC
03
Jan
2024

Why Continuous Training Must Come Before The AI-driven SDLC

By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world….

Phishing in 2024: Here's What to Expect
02
Jan
2024

Phishing in 2024: Here’s What to Expect

Phishing, a deceptive practice where cybercriminals impersonate legitimate entities to extract sensitive information, has been a significant threat in the…

The Future of Modern Networks Is Automated Threat Intelligence.
01
Jan
2024

The Future of Modern Networks Is Automated Threat Intelligence.

By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has…

The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of
01
Jan
2024

The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of

By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these…

The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy
01
Jan
2024

The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy

By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things…

URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
01
Jan
2024

URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes

By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge,…

The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security
30
Dec
2023

The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security

By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation…

The Evolving Landscape of Ransomware Attacks
30
Dec
2023

The Evolving Landscape of Ransomware Attacks

2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
28
Dec
2023

Evolving Cyber Threats in a World of AI: What Can We Expect From 2024?

2023 has been another transformative year for the cyber security industry. The advent of AI has brought significant advantages to…