In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider threats exploiting vulnerabilities to disrupt… The post Publishers Spotlight: Flashpoint appeared first on Cyber Defense…
Category: Cyber Defense Magazine
RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape
Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to drive customer engagement, streamline operations, and generate revenue. Yet, this… The post RASP (Runtime Application Self-Protection) in Mobile Application Security:…
Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture
It’s all about patterns. Long before cybersecurity was on anyone’s radar, defensive intelligence – like catching an enemy spy in your ranks – was about being able to recognize patterns… The post Deciphering End User Data Access Patterns is Key…
Experience from GAP Assessment Audits for NIS2 Compliance
The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations on many organizations that previously had no such requirements. Most… The post Experience from GAP Assessment Audits for NIS2 Compliance…
Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)
Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model. A hybrid model by design leads to dispersion of corporate… The post Building Contextual Data Models for Identity Related Threat…
Incident Response Planning: A Portion of Planning is Worth a Pound of Gold
When you are hacked, you want to recapture control quickly as hackers move through systems, locking sensitive information and holding it for ransom. You need to determine the extent of… The post Incident Response Planning: A Portion of Planning is…
Deepfakes: How Deep Can They Go?
With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer… The post Deepfakes: How Deep Can They Go? appeared first…
Is Platform Engineering a Step Towards Better Governed DevOps?
Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth of platform engineering. 2024’s edition, which includes the results of… The post Is Platform Engineering a Step Towards Better Governed…
Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure
Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without. This digital divide is a global cybersecurity crisis in the… The post Why the Growing Risk of Cyber Inequity Threatens…
How to Root Out Malicious Employees
Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access and permissions than cyber criminals attacking the organisation externally. It… The post How to Root Out Malicious Employees appeared first…