Category: CyberDefenseMagazine

Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
16
Dec
2023

Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework

By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and…

Cybersecurity Is Changing: Is the Experience Positive or Negative?
16
Dec
2023

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative?…

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
16
Dec
2023

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023

Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving…

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
16
Dec
2023

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations

By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the…

Hidden in Plain Sight: Open-Source Software Vulnerabilities
14
Dec
2023

Hidden in Plain Sight: Open-Source Software Vulnerabilities

Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so…

The Emergence of AI In the Enterprise: Know the Security Risks
14
Dec
2023

The Emergence of AI In the Enterprise: Know the Security Risks

By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up…

The Human Firewall: Strengthening the Weakest Link in Cybersecurity
14
Dec
2023

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of…

The Rising Tide of Cybercrime as A Service (CaaS)
14
Dec
2023

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which,…

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
14
Dec
2023

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security

By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with…

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
12
Dec
2023

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

SEC’s New Cybersecurity Rules to Strengthen Transparency and Accountability
12
Dec
2023

SEC’s New Cybersecurity Rules to Strengthen Transparency and Accountability

Why public companies should prepare now to safeguard their operations, reputation, and financial success. By Paul Truitt, Principal and National…

Redefining Operational Readiness with Predictive Maintenance Maximize the Resiliency of Our Nation’s Defense Assets
12
Dec
2023

Redefining Operational Readiness with Predictive Maintenance Maximize the Resiliency of Our Nation’s Defense Assets

By Michael Weigand, Co-Founder and Chief Growth Officer, Shift5 In its annual threat assessment, the Office of the Director of…