Page 3 - Cyber Defense eMagazine February 2024
P. 3
Data Breach Search Engines ------------------------------------------------------------------------------------------------- 62
By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC
Enhancing Cybersecurity Defenses: The Role of Voice Cloning in Penetration Testing --------------------- 65
By Alex Serdiuk, CEO, Respeecher
GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages
---------------------------------------------------------------------------------------------------------------------------------------- 69
By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian
Good Security Is About Iteration, Not Perfection. --------------------------------------------------------------------- 75
By Craig Burland, CISO, Inversion6
Hacking and Cybersecurity --------------------------------------------------------------------------------------------------- 79
By Yashin Manraj, CEO, Pvotal Technologies
How SaaS-based Identity Governance Can Help Future-proof Your Security --------------------------------- 82
By Thomas Müller-Martin, Global Partner Lead, Omada
Hyperbole, Misinformation, and Cyber-Monsters Under the Bed ------------------------------------------------ 86
By Ken Westin, Field CISO, Panther Labs
Identity Management Challenges ----------------------------------------------------------------------------------------- 88
By Milica D. Djekic
Navigating the API Security Landscape: A CEO's Perspective on Embedding Zero Trust Principles ---- 91
By Jyoti Bansal, CEO and co-founder, Traceable AI
Navigating the Digital Age: AI's Crucial Role in Cybersecurity Reinforcement ------------------------------- 94
By Bryan Kissinger, Senior Vice President of Security Solutions and Chief Information Security Officer, Trace3
Offensive Awakening: The 2024 Shift from Defensive to Proactive Security ---------------------------------- 97
By Stephen Gates, Principal SME, Horizon3.ai
Organizational Cybersecurity Hinges on End-User Satisfaction ------------------------------------------------- 100
By Amitabh Sinha, CEO and Co-Founder of Workspot
Overcoming Common Data Security Challenges --------------------------------------------------------------------- 103
By Claude Mandy, Chief Evangelist at Symmetry Systems
Quishing Campaign Exploits Microsoft Open Redirect Vulnerability ------------------------------------------ 107
By Elad Damari, Incident Response Group Manager, Perception Point
Cyber Defense eMagazine – February 2024 Edition 3
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.