The Cybersecurity Maturity Model Certification (CMMC) Program has been a headache for many defense contractors since the idea was first introduced in 2019. The program seeks to protect unclassified information,… The post Win or Lose: Using CMMC 2.0 Proposed Rule…
Category: Cyber Defense Magazine
How The Right Application Server Can Protect Healthcare and Public Institutions from Cyber Attacks
Cybersecurity in the public and healthcare sectors is a growing concern as cyberattacks become increasingly sophisticated and frequent. However, many existing vulnerabilities can be easily addressed to deliver more robust… The post How The Right Application Server Can Protect Healthcare…
To Combat Cyberbullying and Online Fraud, We Must Do More to Protect Minors
The last 20 years have fundamentally redefined how consumers behave online. The emergence of sites such as YouTube, Meta, and X has reshaped how we share and consume media. Online… The post To Combat Cyberbullying and Online Fraud, We Must…
How vCISOs Can Enhance an Organization’s Cybersecurity Posture with Cyber Insurance
In today’s digital age, where cyber threats loom large and data breaches are increasingly common, many organizations are turning to Virtual Chief Information Security Officers (vCISOs) to bolster their cybersecurity frameworks. These… The post How vCISOs Can Enhance an Organization’s Cybersecurity Posture…
Bridging The Manufacturing Security “Air Gap”
In the world of manufacturing, one security measure has stood out above all others: the “air gap.” This technique, which isolates technology from the outside world, once provided a reasonable… The post Bridging The Manufacturing Security “Air Gap” appeared first…
The GenAI Scam Revolution
Introduction The intersection of cutting-edge artificial intelligence technologies and the extensive exposure of personal data has opened a Pandora’s box of potential misuse, including hyper-targeted scams. Large language models (LLMs),… The post The GenAI Scam Revolution appeared first on Cyber…
Navigating Advanced Threat Landscapes
In today’s era, marked by rapid digital transformations and an increase in sophisticated cyber threats, the role of Chief Information Security Officers is more crucial than ever. CISOs face the… The post Navigating Advanced Threat Landscapes appeared first on Cyber…
Why Cybersecurity Compliance in Rail Transportation Has Never Been More Important, Or More Challenging to Keep on Track
As the world’s Rail transportation industry becomes more sophisticated, embracing digital technologies to enhance efficiency, safety, and operational capabilities, it is also exposed to a myriad of cybersecurity threats. The… The post Why Cybersecurity Compliance in Rail Transportation Has Never…
Why Cybersecurity At The Olympics (And All Major Global Events) Shouldn’t Take A Backseat
Although the 2024 Summer Olympics brought more than 15 million visitors to Paris and generated $11 billion in economic activity, the Games didn’t just convene excited fans and world-class athletes—it… The post Why Cybersecurity At The Olympics (And All Major…
Three Big Reasons Ransomware Payments Are Up More Than 5X Over Last Year
If the mission of cybersecurity is to protect the organization from losses to cybercriminals, we are in deep trouble. Over the past year there has been a dramatic increase in… The post Three Big Reasons Ransomware Payments Are Up More…