The Future of Cybersecurity: Predictions for 2025 and Beyond
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators…
How to Hunt for Volt Typhoon Malware in Critical Infrastructure
🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…
Why Do Hackers Love Cryptocurrency?
Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…
UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know
In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of…
Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers
Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there…
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether –…
Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works…
Credential Stuffing; Ny Attorney General Reveals More Than 1.1m Compromised Accounts Discovered
Password-Guessing Is the Attackers’ Latest Weapon of Choice By Ekaterina Khrustaleva, Chief Operating Officer, ImmuniWeb In January 2022, the New York Attorney General Letitia James revealed the results of major…
Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO &…
The Quantum Tipping Point
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential…
Half of Organizations Have Experienced a Cyber Attack on Their Critical IT Assets
By Diem Shin, Product Marketing Lead at Telos Corporation Today’s organizations are cloud-centric and are more connected than ever before. Many organizations are ladened with legacy systems and complex IT…
Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now
There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch…