The Cybersecurity Trends You Need to Know About In 2022
By Jamie Wilson, MD & Founder, Cryptoloc Technology Group In 2021, no sector of the Australian economy was safe from cybercrime. From government agencies to family businesses, and every type…
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic,…
Killware is the Next Big Cybersecurity Threat
By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has expanded to a digital landscape, and the impact affects the general population…
Responding To the Ransomware Pandemic
By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack in history when Russian-linked hacker group REvil breached the US software company’s…
Web Application Penetration Testing Checklist with OWASP Top 10
We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…
Mitigating Risk from Insider Threats in 2022
By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers…
How To Improve Federal Endpoint Detection and Response Tactics and Gain Network Visibility
By Matt Marsden, Vice President, Technical Account Management, Federal, Tanium Endpoint detection and response (EDR) was put on center-stage when the Office of Management and Budget (OMB) released a memo requiring that agencies must collaborate…
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity…
Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure
By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold…
The Top 5 Cloud Security Predictions for 2022
New threats, new apps, new players – but data plays the biggest role in shaping the future. By Amit Shaked, CEO, Laminar 2021 Attacks Set New Records Looking back, 2021…
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and…
Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats
By Hugo Sanchez, Founder and CEO of rThreat Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the weekend, resulting in thousands…