By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…
Category: Cyber Defense Magazine
Classic Information Security Management Errors
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…
How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […] The post How to Identify and Respond to End-of-Life…
Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security
Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […] The post Unmasking the Vulnerabilities in Telecom Signaling: A…
Deepfakes and AI’s New Threat to Security
The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…
A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM
By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […] The post A Tale of Overcoming Cyber Threats with…
Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents
The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […] The post Industry Benchmark Report, Issued by The FAIR…
Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary
Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […] The post Beyond Resumes: Uncovering Hidden Talent at the…
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future
By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […] The post What You Need to Know to Embrace…