Category: CyberDefenseMagazine

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
11
Jan
2024

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery…

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
11
Jan
2024

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense

By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our…

User credentials are by far the best hack
09
Jan
2024

Startling Intellectual Property Theft Insights Every CISO Should Know

In an era where information is as valuable as currency, intellectual property (IP) theft has emerged as a silent yet formidable threat…

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
09
Jan
2024

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns

Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations…

Bolster an Organizational Cybersecurity Strategy with External Data Privacy
09
Jan
2024

Bolster an Organizational Cybersecurity Strategy with External Data Privacy

Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole…

An Age-by-Age Guide to Online Safety for Kids
07
Jan
2024

An Age-by-Age Guide to Online Safety for Kids

By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play,…

Your #1 Security Initiative in 2024 Should be Operational Resilience
07
Jan
2024

Your #1 Security Initiative in 2024 Should be Operational Resilience

The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As…

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
07
Jan
2024

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds

Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for…

Artificial Deception: The State Of “AI” In Defense and Offense
05
Jan
2024

Artificial Deception: The State Of “AI” In Defense and Offense

By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the…

Master Security by Building on Compliance with A Risk-Centric Approach
05
Jan
2024

Master Security by Building on Compliance with A Risk-Centric Approach

By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led…

Charting a Trustworthy AI Journey
05
Jan
2024

Charting a Trustworthy AI Journey

Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies…

Protect your business from the inside out with zero-trust security
04
Jan
2024

Technology, regulation and the human touch: three pointers to stop cyber-crime

Geopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising the stakes…