Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats

by Gary S. Miliefsky, CISSP, fmDHS Ho-ho-hold on to your data! 🎅 The holiday season is here, bringing cheer, gifts, and…cybercriminals?! That’s right! While you’re decking the halls, hackers are…

Posted in Featured | Tagged , , , , | Comments Off on Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats

The Future of Cybersecurity: Predictions for 2025 and Beyond

by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators…

Posted in Featured | Tagged , , , , , | Comments Off on The Future of Cybersecurity: Predictions for 2025 and Beyond

Innovator Spotlight: Salt Security

In a world where APIs have become integral to the digital and technical experience, they also represent a significant security risk, often flying under the radar of traditional security solutions….

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Salt Security

Innovator Spotlight: Cobalt

Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving…

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Cobalt

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to…

Posted in Uncategorized | Tagged , , , , , | Comments Off on The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated….

Posted in Uncategorized | Tagged , , , , | Comments Off on How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

Artificial Intelligence in 2024

Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,…

Posted in Featured | Tagged , , , | Comments Off on Artificial Intelligence in 2024

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile…

Posted in Featured | Tagged , , , , | Comments Off on Sheltering from the Cyberattack Storm

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges…

Posted in Featured | Tagged , , , | Comments Off on Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Posted in Featured, Popular | Tagged , , , , , , , | Comments Off on Why Do Hackers Love Cryptocurrency?

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to…

Posted in Featured | Tagged , , , | Comments Off on Strengthening Cyber Defense with Threat Intelligence Operations

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X