Page 6 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 6
DoD Compliance: The Differences Between CMMC and NIST SP 800-171 .......................... 187
By Joe Coleman / Cyber Security Officer, CMMC RPA / Bluestreak Consulting™ ............................................ 187
Fundamentals of Elliptic Curve Cryptography Operations.................................................... 192
By Joe Guerra, Cybersecurity Professor, Hallmark University ....................................................................... 192
Efficacy-Based Underwriting: A Must-Have in The Face of Cybercrime .............................. 197
By James Gerber, CFO at SimSpace ............................................................................................................. 197
Harnessing the Power of AI in Cybersecurity ....................................................................... 201
By Jose López Muñoz, Head of AI, IriusRisk.................................................................................................. 201
Hashing It Out: The Secret Weapon of Your Data (and Why It Matters) ............................... 205
By Joe Guerra, Cybersecurity Professor, Hallmark University ....................................................................... 205
How GRC Automation has Simplified Regulatory Compliance? ........................................... 211
By Amar Basic, Co-Founder @ CyberArrow.................................................................................................. 211
How To Take the Chaos Out of Vulnerability Management .................................................. 217
By Pierre Samson, CRO at Hackuity ............................................................................................................. 217
Human Error Is Still Wreaking Havoc on Business Security ................................................. 221
By Aaron Drapkin, Lead Writer, Tech.co ...................................................................................................... 221
Inside the Storm-0558 Attack on Microsoft: Can Improved Key Rotation Prevent the Next Big
Breach? ................................................................................................................................ 224
By Amit Zimerman, Co-Founder and CPO at Oasis Security .......................................................................... 224
Locking Down Security Links: Breaking the Chain of Cyber Threats .................................... 227
By Al Lakhani, CEO and Founder, IDEE ........................................................................................................ 227
Navigating the Future of Tech Infrastructure Amidst AI’s Growing Demands ...................... 230
By Karla Jo Helms, Chief Evangelist and Anti-PR® Strategist, JOTO PR Disruptors™ ...................................... 230
Preventing Ddos Attacks Is Smart Business Sense ............................................................. 234
By Phil Richards, Chief Financial Officer, Corero Network Security ............................................................... 234
6