Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first: Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total…
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive…
Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO &…
Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer data is one of the most valuable assets for organizations around the…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement…
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day,…
Is XDR The Right Solution for Today’s Security Threats?
Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but…
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic,…
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity…
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and…