Safeguarding your enterprise’s data operations is more critical than ever. The rise of malicious bot attacks poses a particular threat, making it imperative that businesses develop a cybersecurity strategy that… The post Unlocking The Context Behind Bot Attacks: Protecting Your…
Category: Cyber Defense Magazine
Innovator Spotlight: Cobalt
Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving… The post Innovator Spotlight: Cobalt appeared first on Cyber Defense…
Innovator Spotlight: BackBox
Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights into the tech industry and network security were nothing short… The post Innovator Spotlight: BackBox appeared first on Cyber Defense…
Innovator Spotlight: Delinea
Revolutionizing Identity Security with AI-Driven Solutions At BlackHat 2024, we had the pleasure of discussing the future of identity security with Phil Calvin, Chief Product Officer at Delinea. As organizations… The post Innovator Spotlight: Delinea appeared first on Cyber Defense…
Innovator Spotlight: Pentera
Revolutionizing Cybersecurity with Automated Security Validation In a conversation with Jay Mar-Tang, Field CISO at Pentera, it became clear that the landscape of cybersecurity is rapidly evolving. With the increasing… The post Innovator Spotlight: Pentera appeared first on Cyber Defense…
The Internet of Things Technological Perspective
The Internet of Things (IoT) is a boom which has come with the ongoing industrial progress and revolution offering something inexpensive and suitable to everyone, but yet quite unreliable and… The post The Internet of Things Technological Perspective appeared first…
The Evolution of Device Recognition to Attack Fraud at-Scale
Fraud prevention today is like a game of whack-a-mole. When one fraudster or attack method is stamped out, another arises to take its place. Similarly, when a fraud prevention solution… The post The Evolution of Device Recognition to Attack Fraud…
Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare
Recent studies have estimated that as many as 90% of successful cyberattacks and 70% of data breaches originate at the endpoint. This growing issue is especially impactful within healthcare systems nationwide…. The post Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare…
Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many people are now aware of… The post Making Progress and Losing Ground appeared first on…
Innovator Spotlight: SNYK
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way to fix it without breaking… The post Innovator Spotlight: SNYK appeared first on Cyber Defense…