By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of devices, digital workspaces, and locations, offering new opportunities for cybercriminals […] The post Securing The Virtual Runway to The Cloud…
Category: Cyber Defense Magazine
Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […] The post Sophisticated Cyber Threats Require a New Approach…
The Case Study: The Exploitation of Business Assets
By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search engines and some hacking tools. […] The post The Case Study: The Exploitation of Business…
Combatting Social Engineering – The Invisible Threat
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…
Cyber Strategy Is Not a Synonym for Tech Stack
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…
Beyond Mere Compliance
Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…
How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk
By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security analytics are becoming essential for identifying, preventing and responding to […] The post How to Unify Multiple Analytics Systems to…
How to Overcome the Most Common Challenges with Threat Intelligence
By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly what threats are targeting your organization, well before those adversaries […] The post How to Overcome the Most Common Challenges…