By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast had been a highly successful […] The post Chromecast End-of-Life Announcement Highlights Urgent Need for…
Category: Cyber Defense Magazine
Common Pitfalls of Running On-Premises SIEM Solutions
By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […] The post Common Pitfalls of Running On-Premises SIEM Solutions…
DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These applications need to be built, secured, deployed, and updated on […] The post DevOps’ Big Challenge: Limiting Risk Without Impacting…
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The post Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Managing…
ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu Pavithran, CEO and Founder, Hexnode At the end of August, […] The post ChatGPT For Enterprises Is Here – But…
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace
By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless – right? Wrong. This practice, which is unfortunately still widespread in […] The post The Cyber Risk Nightmare and Financial Risk…
How To Combat the Mounting ‘Hacktivist’ Threat
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […] The post How To Combat the Mounting ‘Hacktivist’ Threat…
OT Cybersecurity: Safeguarding Building Operations in a Digitized World
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has cast a shadow over nearly every aspect of our lives. […] The post OT Cybersecurity: Safeguarding Building Operations in a…
7 Steps to Build a Defense in Depth Strategy for Your Home
By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense in depth” strategy, which means layering defensive security measures to […] The post 7 Steps to Build a Defense in…
Zombie APIs: The Scariest Threat Lurking in The Shadows?
By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…