The Future of Cybersecurity: Predictions for 2025 and Beyond
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,…
Innovator Spotlight: Keepnet Labs
Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response…
Innovator Spotlight: Concentric
Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of…
The Identity Security Mirage: Unveiling the Hidden Risks in Your Digital Infrastructure
In today’s rapidly evolving digital landscape, organizations are increasingly reliant on complex networks of identities to power their operations. From human users to non-human accounts, such as service accounts, APIs,…
SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a sea change for CISOs; both in terms of the burden…
The First 10 Days of a vCISO’S Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by…
Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS
LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated to mobile apps protection, that protects over 2,000 apps worldwide….
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help
On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) reporting rules…
Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids
Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the destruction and incapacity of such systems poses an adverse effect…
The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity
Introduction: In an era where digital innovation advances rapidly and cyber threats evolve just as quickly, it is crucial for organizations to reassess their security strategies. There is a growing…
Protecting Against Malicious Open Source Packages
What Works and What Doesn’t A software package is the dream of reusability made possible. Individual developers and organizations of all kinds contributed software components to public repositories, in standardized…