By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery pipeline is as important as securing the software that is […] The post The Crucial Need for a Secure Software…
Category: Cyber Defense Magazine
Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our lives faster than you could imagine. The question that begs, […] The post Beyond Passwords: AI-Enhanced Authentication in Cyber Defense…
AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations must act now to prevent further damaging losses. By Mathew […] The post AI And Ad Fraud: Growing Risks for…
Bolster an Organizational Cybersecurity Strategy with External Data Privacy
Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole and incentivize top talent to run their business. They also […] The post Bolster an Organizational Cybersecurity Strategy with External…
An Age-by-Age Guide to Online Safety for Kids
By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…
Your #1 Security Initiative in 2024 Should be Operational Resilience
The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security leadership teams decide where to put […] The post Your #1 Security Initiative in 2024 Should…
Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at […] The post Overcoming Multi-Cloud Security Challenges: The Power of…
Artificial Deception: The State Of “AI” In Defense and Offense
By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the infosec industry wouldn’t exist without deception. Although I’ve seen enough […] The post Artificial Deception: The State Of “AI” In…
Master Security by Building on Compliance with A Risk-Centric Approach
By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. […] The post Master Security by Building on Compliance with…
Charting a Trustworthy AI Journey
Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…