Tag: Cyber Defense Magazine

Security Threats Targeting Large Language Models

Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering unprecedented potential for various applications. However, like every new technology,… The post Security Threats Targeting Large Language Models appeared first…

The Role of Human Error in Data Spillage Incidents

Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety… The post The Role of Human Error in Data Spillage…

The Morphing of Misinformation in a Super Election Year

Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is… The post The Morphing of Misinformation in a Super Election…

Why the MoD Breach Calls for a Cybersecurity Overhaul

The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces… The post Why the MoD Breach Calls for a Cybersecurity…

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets

Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations strive to defend against pragmatic threats, AI offers crucial risk… The post AI and Cybersecurity: Mitigating Risks and Safeguarding Digital…

The Scourge of Ransomware

Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and demands a ransom payment for the decryption key. This can… The post The Scourge of Ransomware appeared first on Cyber…

Comparing MDR vs SIEM: Which Is Better for Your Business?

By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…

Rogue Nations: An Assessment of State-Sponsored Cyberattacks.

By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…

The AI Arms Race Shaping Federal Cyber Resilience

By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies in conflicting uses. On one hand, malicious actors harness AI […] The post The AI Arms Race Shaping Federal Cyber…

A National Imperative – Cyber Resiliency

Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…

How and When to Know You Need a Fractional CISO

By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and breaches of customer data, payment information, intellectual property and more […] The post How and When to Know You Need…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top. […] The post Understanding the Dark Web: What You Need…

Navigating the Perilous Waters of Supply Chain Cybersecurity

By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…

Emerging Technology Review and Needs

By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to […] The post Emerging Technology Review and Needs appeared first…

Spotlight on Scribe Security

By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the most difficult challenges for Security is achieving good relations and […] The post Spotlight on Scribe Security appeared first on…

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…

Spotlight on Riskassure

Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, CyberDefense Magazine In preparing for this article, I met with Larry Faragalli, Keith Huckaby, […] The post Spotlight on Riskassure appeared first on Cyber…

Applied Human Threat Management in Cyber Industry

By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…

Limits of Automation

How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…

Cryptographic Protocol Challenges

By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…

Cybersecurity Concerns Facing the 2024 U.S. Elections

By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…

CES: AI at the Forefront of Cybersecurity’s Future

Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…

Relying on the Unreliable

The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…

CTI for M&A

Active dark web Intelligence to aid M&A  By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…

Is Zero Trust Enough?

Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […] The post Is Zero Trust Enough? appeared first on…

Becoming Resilient to The Cyber Incidents of Today And Tomorrow

By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…

6 Factors to Consider When Choosing a SIEM Solution

Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…

2024: The Year of Secure Design

By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…

Fortifying Digital Health Against Cyber Attacks

By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…

Cybersecurity or Cyber Resilience: Which Matters More?

Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…

Will We Ever See Federal Data Breaches End Entirely?

Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…

Why Is Hardware More Secure than Software?

The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…

Rise of the Cyber Supervillain

By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […] The post Rise of the Cyber Supervillain appeared first…

Spike in Layoffs Pose Serious Cybersecurity Concerns

Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […] The post Spike in Layoffs Pose Serious Cybersecurity Concerns…

Red Sea Crisis and the Risk of Cyber Fallout

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […] The post Red Sea Crisis and the Risk of…

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability

Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager, Perception Point QR codes can be found almost everywhere, helping […] The post Quishing Campaign Exploits Microsoft Open Redirect Vulnerability…

Overcoming Common Data Security Challenges

By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions, data is what keeps an organization ticking. As digital transformation […] The post Overcoming Common Data Security Challenges appeared first…

Detect and Destroy Cyber Threats with Red Piranha

By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member of Team Defence Australia for advanced cybersecurity solutions. Dedicated to […] The post Detect and Destroy Cyber Threats with Red…

Organizational Cybersecurity Hinges on End-User Satisfaction

The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era of sophisticated cyber-attacks, security leaders are feeling the pressure to […] The post Organizational Cybersecurity Hinges on End-User Satisfaction appeared…

Identity Management Challenges

By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are through fingerprint, iris detection, DNA and so on, while some […] The post Identity Management Challenges appeared first on Cyber…