Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…
Tag: Cyber Defense Magazine
IT Modernization Efforts Need to Prioritize Cybersecurity
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…
From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […] The post From Network Perimeters to Cloud Access Security…
How to Avoid Common Security Incidents in the Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…
E-mail Compromise
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of damage in the city, with over 28,000 buildings destroyed and […] The post Earthquakes, Cyber Breaches, and Mitigating Disasters through…
Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient privacy, secure data integrity, and ensure the uninterrupted delivery of […] The post Safeguarding Healthcare: A Closer Look at the…
Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic algorithms to protect against most quantum attacks. The threats of […] The post Post-Quantum Cryptography: Safeguarding the Digital Future and…
With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George Tubin, Director of Product Strategy, Cynet The U.S. travel market […] The post With Americans Traveling More Than Ever Before,…