Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence
By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence…
When Businesses Get Hacked- Who Are the Victims?
This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing Executive, SaltDNA. Cyber-attacks occur every two and a half minutes, according to…
Operation NightScout: supply chain attack on NoxPlayer Android emulator
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. UPDATE (February 18, 2021): Following the publication of our…
What’s in Your Wallet? The Cybersecurity Costs of COVID
With new business challenges in play, organizations are shifting their cybersecurity spend accordingly By Mark Sangster, Vice President, and Industry Security Strategist, eSentire If anything has become clear over the…
Readiness and Risk Exposure in the New Normal
By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their…
NCSAM Provided an Opportunity to Reset Our Approach to Cybersecurity
October marked National Cyber Security Awareness Month, but experts warn that cybersecurity requires attention 24/7/365 By Sam Humphries, Security Strategist, Exabeam Earlier this year in the rapid transition to a…
No Meows Is Good News: Proactive Nosql Database Security in The Era of Meow Attacks
By Jack Harper, Director of Professional Services at Couchbase This summer, a spate of cyberattacks in which cybercriminals targeted internet-connected ElasticSearch and other unsecured databases continued to fuel concerns about…
Perfecting Your Cybersecurity Sales Process
By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck,…
The Impact of Ransomware on Cloud Services and How to Stop Attacks
By Davit Asatryan, Product Manager, Spin Technology Cloud technology and services continue to gain popularity due to their ability to allow businesses to cut costs, improve an outdated IT infrastructure,…
Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college…
How to Avoid or Remove Mac Malware
Today, Macs are more prone to hacking attacks than PCs. In this article, you’ll find useful tips on how to detect malware on your computer and get rid of it….