1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse and sophisticated. As a result, responding to these cybersecurity threats… The post The Role of Intelligence in Cyber Threat Response…
Category: Cyber Defense Magazine
Innovator Spotlight: Concentric AI
It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…
How Automation Can Help Security Policy Optimization
One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer, however, is far from simple. The truth is that a… The post How Automation Can Help Security Policy Optimization appeared…
Unmasking Shadow Apps to Secure Your SaaS Stack
It is a tale almost as old as time: users click download, install, and accept as they adopt new software applications without considering the security implications, or getting approval from… The post Unmasking Shadow Apps to Secure Your SaaS Stack…
Beyond Fines: The Real Value of Achieving Cybersecurity Compliance
Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the true value of compliance extends far beyond financial penalties. It… The post Beyond Fines: The Real Value of Achieving Cybersecurity…
It’s Time to Sound the Alarm on SMB Cyber Threats
There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small” to be worried about a potential attack, think again. As… The post It’s Time to Sound the Alarm on SMB…
Escalating Cyberattacks in the Healthcare Sector
The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly over the last several months. More than 124 million records were compromised… The post Escalating Cyberattacks in the Healthcare Sector appeared first…
SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a sea change for CISOs; both in terms of the burden… The post SEC Cybersecurity Disclosure Rules – Are CISOs Ready…
The First 10 Days of a vCISO’S Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by… The post The First 10 Days of a vCISO’S Journey…
Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS
LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated to mobile apps protection, that protects over 2,000 apps worldwide…. The post Lockin Company’s Approach to Zero Trust Security and…
The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida
As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas Data Privacy and Security Act, Oregon Consumer Privacy Act, and… The post The Next Iteration of Privacy: What Businesses Should…
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help
On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) reporting rules… The post What CIRCIA Means for Critical Infrastructure Providers and…
Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids
Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the destruction and incapacity of such systems poses an adverse effect… The post Cybersecurity In Critical Infrastructure: Protecting Power Grids and…
From Burnout to Balance: How AI Supports Cybersecurity Professionals
As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this past year, the number of security vulnerabilities increased by 21%,… The post From Burnout to Balance: How AI Supports Cybersecurity…
Getting Out in Front of Post-Quantum Threats with Crypto Agility
Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think. Quantum technology has the potential to transform applications like materials… The post Getting Out in Front of Post-Quantum Threats with…
Innovator Spotlight: Zilla Security
by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with identity governance and administration (IGA) standards becomes increasingly complex. A… The post Innovator Spotlight: Zilla Security appeared first on Cyber…
Innovator Spotlight: Guardio
Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity theft, and online fraud highlights the urgent need for accessible… The post Innovator Spotlight: Guardio appeared first on Cyber Defense…
Top Tips and Risks Ahead of the 2024 Olympic Games
As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The… The post Top Tips and Risks Ahead of the 2024…
The MDR That Sees It All
Unmonitored infrastructure is a major source of initial compromises for enterprises. The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset… The post The MDR That Sees It All appeared first…
Fortifying The Digital Frontier: Everyday Habits That Shape Your Company’s Cybersecurity Posture
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our personal and professional lives are increasingly blurred. However, with this… The post Fortifying The Digital Frontier: Everyday Habits That Shape…
How SMBs Can Implement Cyber-HDR for Increased Protection and Reduced Risk Harden-Detect-Respond
Implementing Cyber-HDR for SMBs: Enhancing Protection and Reducing Risk In today’s digital landscape, small and medium-sized businesses (SMBs) face increasing threats from cyber espionage and cybercrime. With 46% of SMBs… The post How SMBs Can Implement Cyber-HDR for Increased Protection…
Spotlight on DeepKeep.ai
DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…
Publisher’s Spotlight: Reach Security
The AI-Driven Solution Transforming Cybersecurity Infrastructure by Gary Miliefsky Publisher and Dan K. Anderson vCISO and Writer Reach Security is revolutionizing cybersecurity by introducing the first AI specifically designed to… The post Publisher’s Spotlight: Reach Security appeared first on Cyber…
Innovator Spotlight: Qwiet
The volume of code needed is greater than ever while cycles to produce said code are shrinking. One of the consequences of this is security has become secondary – both… The post Innovator Spotlight: Qwiet appeared first on Cyber Defense…
Innovator Spotlight: ZINAD
In today’s fast-evolving digital landscape, cyber attackers are becoming increasingly creative, targeting the human element as a primary entry point. Research shows that human error accounts for up to 90%… The post Innovator Spotlight: ZINAD appeared first on Cyber Defense…
One Year Later: CISA’s Secure by Design Initiative
In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA) unveiled the Secure by Design initiative, setting a new standard for security across the industry. The initiative urges vendors to create… The post One Year Later: CISA’s Secure by Design Initiative…
Innovator Spotlight: HyperCube
by Pete Green, vCISO, Cybersecurity Consultant and Reporter for CDM Gartner has stated the challenge facing most organizations today: “Boards are now pushing back for improved understanding of what they… The post Innovator Spotlight: HyperCube appeared first on Cyber Defense…
Publishers Spotlight: HackerOne
I was thrilled to catch up with HackerOne during Black Hat USA 2024. The modern threat landscape presents increasingly complex cybersecurity challenges for modern organizations. Emerging technologies, like generative AI,… The post Publishers Spotlight: HackerOne appeared first on Cyber Defense…
The Great Ai Swindle
AI washing, or making inflated or misleading claims about AI capabilities, is nothing new. In some ways it is to be expected when a new disruptive technology hits the limelight…. The post The Great Ai Swindle appeared first on Cyber…
Modernizing and Applying FedRAMP Security Standards to Accelerate Safe AI
Often, technology develops faster than we can handle. This is especially true for the federal government and its partners — organizations that must adhere to strict security standards in the… The post Modernizing and Applying FedRAMP Security Standards to Accelerate…
From Burnout to Balance: How AI Supports Cybersecurity Professionals
As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this past year, the number of security vulnerabilities increased by 21%,… The post From Burnout to Balance: How AI Supports Cybersecurity…
Getting Out in Front of Post-Quantum Threats with Crypto Agility
Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think. Quantum technology has the potential to transform applications like materials… The post Getting Out in Front of Post-Quantum Threats with…
The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity
Introduction: In an era where digital innovation advances rapidly and cyber threats evolve just as quickly, it is crucial for organizations to reassess their security strategies. There is a growing… The post The Perils of Settling: Why ‘Good Enough’ Fails…
Top Tips and Risks Ahead of the 2024 Olympic Games
As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The… The post Top Tips and Risks Ahead of the 2024…
Protecting Against Malicious Open Source Packages
What Works and What Doesn’t A software package is the dream of reusability made possible. Individual developers and organizations of all kinds contributed software components to public repositories, in standardized… The post Protecting Against Malicious Open Source Packages appeared first…
Unlocking Secure Communications 101: The Fundamentals
Ensuring the protection of data and communications is of utmost importance for organisations adapting to the intricacies of the digital era. Are you knowledgeable about secure communications? Whether you’re new… The post Unlocking Secure Communications 101: The Fundamentals appeared first…
Fortifying The Digital Frontier: Everyday Habits That Shape Your Company’s Cybersecurity Posture
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our personal and professional lives are increasingly blurred. However, with this… The post Fortifying The Digital Frontier: Everyday Habits That Shape…
Innovator Spotlight: Cymulate
AI Copilot: Revolutionizing Threat Exposure Validation by Samridhi Agarwal, Master’s Student, CMU During BlackHat, Cymulate, a leader in security and exposure validation, has officially launched Cymulate AI Copilot, an innovative,… The post Innovator Spotlight: Cymulate appeared first on Cyber Defense…
Innovator Spotlight: Illumio
Pioneering Zero Trust Segmentation for Comprehensive Cybersecurity by Samridhi Agarwal, Master’s Student, CMU In today’s rapidly evolving cybersecurity landscape, organizations face increasingly sophisticated threats that can breach even the most… The post Innovator Spotlight: Illumio appeared first on Cyber Defense…
Innovator Spotlight: Fortanix
Unveiling Secure Data Practices in a World of AI Risks by Samridhi Agarwal, Master’s Student, CMU In an era where artificial intelligence is becoming increasingly prevalent, organizations face new and… The post Innovator Spotlight: Fortanix appeared first on Cyber Defense…
Tips for Detecting and Preventing Multi-Channel Impersonation Attacks
Recently, the CEO of the world’s biggest advertising group, Mark Read, was the target of a deepfake scam using an AI-based voice clone. Read disclosed that scammers used a publicly available photo… The post Tips for Detecting and Preventing Multi-Channel Impersonation Attacks…
Innovator Spotlight: Expel
Leading the Charge in Managed Detection and Response by Samridhi Agarwal, Master’s Student, CMU In a conversation with Greg Notch, CISO at Expel, explored the increasing sophistication of cyber threats,… The post Innovator Spotlight: Expel appeared first on Cyber Defense…
Spotlight on Oleria
Q&A with OIeria CEO Jim Alkove: Identity is the keystone to the future of cybersecurity and a critical area for companies to focus on because it’s where attackers are moving…. The post Spotlight on Oleria appeared first on Cyber Defense…
Innovator Spotlight: Salt Security
In a world where APIs have become integral to the digital and technical experience, they also represent a significant security risk, often flying under the radar of traditional security solutions…. The post Innovator Spotlight: Salt Security appeared first on Cyber…
Innovator Spotlight: HUMAN
During my conversation with Lindsay Kaye, VP of Threat Intelligence at HUMAN Security, she emphasized how HUMAN tackles some of the most complex and overlooked threats in today’s digital landscape…. The post Innovator Spotlight: HUMAN appeared first on Cyber Defense…
Innovator Spotlight: Tanium
During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the company addresses the critical challenge of operational risk and security… The post Innovator Spotlight: Tanium appeared first on Cyber Defense…
Innovator Spotlight: Keepnet Labs
Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue to be the primary target for cybercriminals, particularly through social… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…
Innovator Spotlight: Lineaje
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way of cybersecurity innovation. … The post Innovator Spotlight: Lineaje appeared first on Cyber Defense…
GDPR & CCPA: A CIO’s Essential Guide to Email Compliance
Imagine a world where your inbox isn’t a monster overflowing with junk. A world where you can be confident your emails are safe and secure. That’s the power of email… The post GDPR & CCPA: A CIO’s Essential Guide to…
AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches
Artificial intelligence (AI) has rapidly reshaped the cybersecurity landscape and simultaneously presents both exciting advancements while also introducing new challenges. As AI’s role in the tactics of both cyber attackers… The post AI in Cybersecurity: Understanding Challenges, Opportunities and New…
Cyber Threats vs. Risks: Building a Proactive Cyber Defense
As cybersecurity threats continue to evolve in the ever-changing cyber landscape, organizations within every industry must implement a comprehensive security strategy to remain resilient in the face of attacks. While… The post Cyber Threats vs. Risks: Building a Proactive Cyber…
Why Legacy MFA is DOA
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA, now often referred to as “legacy MFA,” are increasingly seen… The post Why Legacy MFA is DOA appeared first on…
Best Practices for Enterprise Security
Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last thing an organization wants to experience and can cause long-lasting… The post Best Practices for Enterprise Security appeared first on…
Unlocking The Context Behind Bot Attacks: Protecting Your Go-To-Market Strategy
Safeguarding your enterprise’s data operations is more critical than ever. The rise of malicious bot attacks poses a particular threat, making it imperative that businesses develop a cybersecurity strategy that… The post Unlocking The Context Behind Bot Attacks: Protecting Your…
Innovator Spotlight: Cobalt
Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving… The post Innovator Spotlight: Cobalt appeared first on Cyber Defense…
Innovator Spotlight: BackBox
Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights into the tech industry and network security were nothing short… The post Innovator Spotlight: BackBox appeared first on Cyber Defense…
Innovator Spotlight: Delinea
Revolutionizing Identity Security with AI-Driven Solutions At BlackHat 2024, we had the pleasure of discussing the future of identity security with Phil Calvin, Chief Product Officer at Delinea. As organizations… The post Innovator Spotlight: Delinea appeared first on Cyber Defense…
Innovator Spotlight: Pentera
Revolutionizing Cybersecurity with Automated Security Validation In a conversation with Jay Mar-Tang, Field CISO at Pentera, it became clear that the landscape of cybersecurity is rapidly evolving. With the increasing… The post Innovator Spotlight: Pentera appeared first on Cyber Defense…
The Internet of Things Technological Perspective
The Internet of Things (IoT) is a boom which has come with the ongoing industrial progress and revolution offering something inexpensive and suitable to everyone, but yet quite unreliable and… The post The Internet of Things Technological Perspective appeared first…
The Evolution of Device Recognition to Attack Fraud at-Scale
Fraud prevention today is like a game of whack-a-mole. When one fraudster or attack method is stamped out, another arises to take its place. Similarly, when a fraud prevention solution… The post The Evolution of Device Recognition to Attack Fraud…
Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare
Recent studies have estimated that as many as 90% of successful cyberattacks and 70% of data breaches originate at the endpoint. This growing issue is especially impactful within healthcare systems nationwide…. The post Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare…
Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many people are now aware of… The post Making Progress and Losing Ground appeared first on…
Innovator Spotlight: SNYK
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way to fix it without breaking… The post Innovator Spotlight: SNYK appeared first on Cyber Defense…
Publishers Spotlight: Blumira
I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management (SIEM) systems can seem like… The post Publishers Spotlight: Blumira appeared first on Cyber Defense…
Innovator Spotlight: ThreatLocker
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These breaches can be triggered by seemingly harmless actions, such as… The post Innovator Spotlight: ThreatLocker appeared first on Cyber Defense…
Spotlight on Sysdig
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud infrastructure happen within 10 minutes, leaving traditional security tools struggling… The post Spotlight on Sysdig appeared first on Cyber Defense…
Spotlight on Akto.ai
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According to Gartner, by 2025, APIs will be the top attack… The post Spotlight on Akto.ai appeared first on Cyber Defense…
Innovator Spotlight: Beyond Identity
At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking work in secure identity and access management (IAM). In an… The post Innovator Spotlight: Beyond Identity appeared first on Cyber…
Innovator Spotlight: Zenity
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a pioneering company that is redefining how enterprises approach security for… The post Innovator Spotlight: Zenity appeared first on Cyber Defense…
Innovator Spotlight: Traceable AI
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way for cybersecurity innovation…. The post Innovator Spotlight: Traceable AI appeared first on Cyber…
Innovator Spotlight: Reco.ai
As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon Institute, 63% of data breaches… The post Innovator Spotlight: Reco.ai appeared first on Cyber Defense…
Strengthening Your Cybersecurity Insurance Posture with Privileged Access Management (PAM) Solutions
In an era where cyber threats loom larger than ever, businesses are increasingly relying on cyber insurance as a critical component of their risk management strategy. Indeed, the Netwrix 2024 Hybrid… The post Strengthening Your Cybersecurity Insurance Posture with Privileged Access…
Spotlight on Simbian
The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…
Innovator Spotlight: DNSFilter
In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…
Innovator Spotlight: Gurucul
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry. As a fellow woman in this field, I was particularly… The post Innovator Spotlight: Gurucul appeared first on Cyber Defense…
The End of the Tunnel Vision: Why Companies Are Ditching VPNs for Zero Trust
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution: they create a secure tunnel between a user’s device and… The post The End of the Tunnel Vision: Why Companies…
Innovator Spotlight: Cyversity
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve the consistent representations of women, underrepresented minorities, and all veterans… The post Innovator Spotlight: Cyversity appeared first on Cyber Defense…
Encryption of Data at Rest: The Cybersecurity Last Line of Defense
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of cybersecurity, where threats are becoming increasingly sophisticated and pervasive, traditional… The post Encryption of Data at Rest: The Cybersecurity Last…
Striking a Balance Between the Risks and Rewards of AI Tools
With all the recent hype, many may not realize artificial intelligence is nothing new. The idea of thinking machines was first introduced by Alan Turing in the 1950s, and the… The post Striking a Balance Between the Risks and Rewards…
Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But the cybersecurity storm doesn’t stop… The post Sheltering From the Cyberattack Storm – Part Two…
Strategizing Compliance and Security In AI: A Hands-On Guide for IT Leaders
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing and emerging legal, ethical, and regulatory standards has never been… The post Strategizing Compliance and Security In AI: A Hands-On…
Innovator Spotlight: ArmorCode
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…
Cyber-Informed Engineering – A New Perspective on OT Security
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and IT/enterprise cybersecurity teams alike. This kind of consensus among IT… The post Cyber-Informed Engineering – A New Perspective on OT…
Publisher’s Spotlight: Checkmarx
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a host of expanding security challenges: the rising number of point… The post Publisher’s Spotlight: Checkmarx appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Publisher’s Spotlight: Horizon3.ai
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat Report findings confirm that 71%… The post Publisher’s Spotlight: Horizon3.ai appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Innovator Spotlight: Reach Security
Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…
Innovator Spotlight: SecPod
Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…
Innovator Spotlight: Cigent
As organizations increasingly rely on edge devices for data collection and processing, the risk of sensitive data breaches has escalated. The proliferation of traditional and emerging devices, such as IoT,… The post Innovator Spotlight: Cigent appeared first on Cyber Defense…
Innovator Spotlight: ExtraHop
As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and security decision-makers admitting to having paid at least one ransom… The post Innovator Spotlight: ExtraHop appeared first on Cyber Defense…
Innovator Spotlight: Upwind
The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022, 45% of businesses reported cloud-based data breaches or failed audits,… The post Innovator Spotlight: Upwind appeared first on Cyber Defense…
Innovator Spotlight: Normalyze
In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face critical challenges in maintaining visibility… The post Innovator Spotlight: Normalyze appeared first on Cyber Defense…
Innovator Spotlight: Harmonic Security
The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT research, 77% of organizations identify… The post Innovator Spotlight: Harmonic Security appeared first on Cyber…
Innovator Spotlight: AppSOC
The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address. Gartner predicts that by 2025,… The post Innovator Spotlight: AppSOC appeared first on Cyber Defense…
From Crisis to Catalyst: A CEO’s Lessons Learned from A Cybersecurity Incident
There are events in business and life that put everything else into perspective. Sometimes, these are moments of crisis, yet also moments of clarity; moments of shock, and moments of… The post From Crisis to Catalyst: A CEO’s Lessons Learned…
Publisher’s Spotlight: Cyera
I was thrilled to catch up with Cyera during Black Hat USA 2024. Over 90% of the world’s data was created in the last two years – making data the… The post Publisher’s Spotlight: Cyera appeared first on Cyber Defense…
Publisher’s Spotlight: Cranium
I was thrilled to catch up with Cranium during Black Hat USA 2024. CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publisher’s Spotlight: Cranium appeared first on Cyber Defense…
Publishers Spotlight: Cranium
I was thrilled to catch up with Cranium during Black Hat USA 2024. CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publishers Spotlight: Cranium appeared first on Cyber Defense…
Rethinking Cyber-Physical Systems Security in the Age of Industry 4.0
As manufacturing advances into the Industry 4.0 era, the integration of Information Technology (IT) and Operational Technology (OT) necessitates a comprehensive defense strategy tailored to the unique needs of industrial… The post Rethinking Cyber-Physical Systems Security in the Age of…