Cyber Defense Magazine InfoSec Knowledge is Power
- Security in AI Era: Protecting AI Workloads with Google Cloudby News team on October 7, 2025 at 1:00 pm
Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with large language models and generative AI, has made it… The post Security in AI Era: Protecting AI Workloads with Google Cloud appeared first on Cyber Defense Magazine.
- What Security Teams Are Looking for in Identity Management Todayby News team on October 6, 2025 at 8:14 pm
Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right approach. Well regarded cybersecurity thought-leader, Francis Odum recently noted that a company’s identity posture… The post What Security Teams Are Looking for in Identity Management Today appeared first on Cyber Defense Magazine.
- How Can IT Security Professionals Best Navigate the CMMC Maze?by News team on October 5, 2025 at 1:00 pm
For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by the U.S. Department of Defense (DoD), CMMC is a comprehensive… The post How Can IT Security Professionals Best Navigate the CMMC Maze? appeared first on Cyber Defense Magazine.
- Breaking Point: Storage & Backup Systemsby News team on October 4, 2025 at 1:00 pm
Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a high-priority target for cybercriminals. In the last two months alone, there… The post Breaking Point: Storage & Backup Systems appeared first on Cyber Defense Magazine.
- Innovator Spotlight: Singulr AIby Gary on October 3, 2025 at 4:41 pm
The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection point. The rapid emergence of artificial intelligence technologies presents both unprecedented opportunities and significant… The post Innovator Spotlight: Singulr AI appeared first on Cyber Defense Magazine.
- AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defenseby News team on October 3, 2025 at 3:00 pm
Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and intelligent prioritization of threats on SOC and infrastructure. The cyber… The post AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense appeared first on Cyber Defense Magazine.
- Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testingby News team on October 3, 2025 at 1:00 pm
In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring numerous benefits, they also introduce significant risks. Traditional third-party risk… The post Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing appeared first on Cyber Defense Magazine.
- The Digital Campus Challenge: Why Universities Need to Reassess Cyber Risksby News team on October 2, 2025 at 3:00 pm
In February 2024, several British universities were hit by a major DDoS attack. In the past, a disruption to connectivity would mostly have been a problem for the university itself, but… The post The Digital Campus Challenge: Why Universities Need to Reassess Cyber Risks appeared first on Cyber Defense Magazine.
- Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identitiesby News team on October 2, 2025 at 1:00 pm
As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to protecting Non-Human Identities (NHIs)—such as API keys, service accounts, secrets, tokens, and certificates. While… The post Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities appeared first on Cyber Defense Magazine.
- Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimizationby News team on October 1, 2025 at 3:00 pm
In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the proliferation of security tools. While each solution promises to strengthen defenses, the… The post Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization appeared first on Cyber Defense Magazine.