Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […] The post What are the Essential Skills for Cyber…
Tag: Cyber Defense Magazine
Enhancing The Nation’s Cybersecurity Workforce
Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…
Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy
WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […] The post Why Digital Trust Has Become More Critical…
Does Zero Trust Improve Productivity?
By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…
Cybersecurity Threats in Global Satellite Internet
By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…
Classic Information Security Management Errors
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…
How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […] The post How to Identify and Respond to End-of-Life…
Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security
Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […] The post Unmasking the Vulnerabilities in Telecom Signaling: A…
Deepfakes and AI’s New Threat to Security
The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…