During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the company addresses the critical challenge of operational risk and security… The post Innovator Spotlight: Tanium appeared first on Cyber Defense…
Category: Cyber Defense Magazine
Innovator Spotlight: Keepnet Labs
Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue to be the primary target for cybercriminals, particularly through social… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…
Innovator Spotlight: Lineaje
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way of cybersecurity innovation. … The post Innovator Spotlight: Lineaje appeared first on Cyber Defense…
GDPR & CCPA: A CIO’s Essential Guide to Email Compliance
Imagine a world where your inbox isn’t a monster overflowing with junk. A world where you can be confident your emails are safe and secure. That’s the power of email… The post GDPR & CCPA: A CIO’s Essential Guide to…
AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches
Artificial intelligence (AI) has rapidly reshaped the cybersecurity landscape and simultaneously presents both exciting advancements while also introducing new challenges. As AI’s role in the tactics of both cyber attackers… The post AI in Cybersecurity: Understanding Challenges, Opportunities and New…
Cyber Threats vs. Risks: Building a Proactive Cyber Defense
As cybersecurity threats continue to evolve in the ever-changing cyber landscape, organizations within every industry must implement a comprehensive security strategy to remain resilient in the face of attacks. While… The post Cyber Threats vs. Risks: Building a Proactive Cyber…
Why Legacy MFA is DOA
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA, now often referred to as “legacy MFA,” are increasingly seen… The post Why Legacy MFA is DOA appeared first on…
Best Practices for Enterprise Security
Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last thing an organization wants to experience and can cause long-lasting… The post Best Practices for Enterprise Security appeared first on…
Unlocking The Context Behind Bot Attacks: Protecting Your Go-To-Market Strategy
Safeguarding your enterprise’s data operations is more critical than ever. The rise of malicious bot attacks poses a particular threat, making it imperative that businesses develop a cybersecurity strategy that… The post Unlocking The Context Behind Bot Attacks: Protecting Your…
Innovator Spotlight: Cobalt
Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving… The post Innovator Spotlight: Cobalt appeared first on Cyber Defense…