Category: CyberDefenseMagazine
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework…
Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker…
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The…
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By…
By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…
Abstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that…
By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations,…