By Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […] The post Building a Secure Data-Protection Infrastructure to Protect…
Category: Cyber Defense Magazine
Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […] The post Do You Know Where Your Data Is?…
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […] The post 2024 Predictions: The Rise of AI Brings…
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?
By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […] The post What’s The Role of Gaslighting in The…
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…
With The World Distracted, China Stirs Trouble in The Asia Pacific
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that “conflict and chaos could spread to the Indo-Pacific” from late October, and, amidst the […] The post With The World Distracted, China Stirs Trouble…
Wireless Peripheral Devices – Security Risk, Exploits and Remediation
This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security exploits. By Prathibha Muraleedhara and Akhilesh Bhangepatil Abstract The advancement of […] The post Wireless Peripheral Devices – Security Risk, Exploits…
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […] The post Bolstering IoT Cybersecurity Amid an Evolving Landscape:…
Why Companies Are Still Investing in Tech During an Economic Slowdown
By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […] The post Why Companies Are Still Investing in Tech…