Page 6 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 6

DoD Compliance: The Differences Between CMMC and NIST SP 800-171 .......................... 187
            By Joe Coleman / Cyber Security Officer, CMMC RPA / Bluestreak Consulting™ ............................................ 187


            Fundamentals of Elliptic Curve Cryptography Operations.................................................... 192
            By Joe Guerra, Cybersecurity Professor, Hallmark University ....................................................................... 192


            Efficacy-Based Underwriting: A Must-Have in The Face of Cybercrime .............................. 197
            By James Gerber, CFO at SimSpace ............................................................................................................. 197


            Harnessing the Power of AI in Cybersecurity ....................................................................... 201
            By Jose López Muñoz, Head of AI, IriusRisk.................................................................................................. 201


            Hashing It Out: The Secret Weapon of Your Data (and Why It Matters) ............................... 205
            By Joe Guerra, Cybersecurity Professor, Hallmark University ....................................................................... 205


            How GRC Automation has Simplified Regulatory Compliance? ........................................... 211
            By Amar Basic, Co-Founder @ CyberArrow.................................................................................................. 211


            How To Take the Chaos Out of Vulnerability Management .................................................. 217
            By Pierre Samson, CRO at Hackuity ............................................................................................................. 217


            Human Error Is Still Wreaking Havoc on Business Security ................................................. 221
            By Aaron Drapkin, Lead Writer, Tech.co ...................................................................................................... 221

            Inside the Storm-0558 Attack on Microsoft: Can Improved Key Rotation Prevent the Next Big

            Breach? ................................................................................................................................ 224
            By Amit Zimerman, Co-Founder and CPO at Oasis Security .......................................................................... 224

            Locking Down Security Links: Breaking the Chain of Cyber Threats .................................... 227

            By Al Lakhani, CEO and Founder, IDEE ........................................................................................................ 227

            Navigating the Future of Tech Infrastructure Amidst AI’s Growing Demands ...................... 230

            By Karla Jo Helms, Chief Evangelist and Anti-PR® Strategist, JOTO PR Disruptors™ ...................................... 230

            Preventing Ddos Attacks Is Smart Business Sense ............................................................. 234

            By Phil Richards, Chief Financial Officer, Corero Network Security ............................................................... 234










                                                                                                               6
   1   2   3   4   5   6   7   8   9   10   11