Category: CyberDefenseMagazine

Cyber Strategy Is Not a Synonym for Tech Stack
26
Dec
2023

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid….

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
26
Dec
2023

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices…

Beyond Mere Compliance
26
Dec
2023

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and…

Stronger Together: Attack Surface Management and Security Validation
24
Dec
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk
24
Dec
2023

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk

By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security…

How to Overcome the Most Common Challenges with Threat Intelligence
24
Dec
2023

How to Overcome the Most Common Challenges with Threat Intelligence

By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly…

The Persistent Danger of Remcos RAT
24
Dec
2023

The Persistent Danger of Remcos RAT

By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information…

Forging A New Era of Invoicing Security
22
Dec
2023

Forging A New Era of Invoicing Security

How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be…

Digital Criminal Ontology; Trading Pistols for Programmers
22
Dec
2023

Digital Criminal Ontology; Trading Pistols for Programmers

By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet…

Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies
22
Dec
2023

Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies

Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration,…

CSM Editorial Podcast - Cybersecurity Magazine
20
Dec
2023

CSM Editorial Podcast – Cybersecurity Magazine

In our latest editorial podcast with Anand Prasad and Hans Christian Rudolph, we reflect on the past year in cybersecurity….

How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?
20
Dec
2023

How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Today, headlines surrounding AI tools such as ChatGPT today are largely pessimistic….