Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
Category: Cyber Defense Magazine
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…
Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […] The post Closing the Gap: Safeguarding Critical Infrastructure’s IT…
The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…
The Cybersecurity Bridge: A Necessary Connection for IT and Communications
By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […] The post The Cybersecurity Bridge: A Necessary Connection for…
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […] The post Three Things to Know About the New…