From the Fall 2023 Issue

The Significance of Cybersecurity Education in the Era of Digital Innovation

Author(s):

Michelle Moore, Ph.D., Academic Director and Professor, University of San Diego

The Significance of Cybersecurity Education

Tech experts must be tireless in providing top-tier protection against evolving cybercrimes. In many cases, cybercriminals have the means to morph their attacks and evade detection, creating a moving target. The best defense? A well-educated workforce. The impacts of cyber attacks are vast, and consequences of the crimes run the gamut across industries, impacting life … Read more

From the Fall 2023 Issue

Cyber Culture: The Missing Link

Author(s):

Chris Pogue, Director, Digital Forensics and Incident Response, CyberCX

Cyber Culture: The Missing Link

As I started to write this article, I sat in my office and stared at my monitor, thinking about where to begin.  There is so much going through my mind that it’s hard to calm my thoughts down enough to be able to communicate the torrent of ideas that seem to exist just out of … Read more

From the Fall 2023 Issue

Adapt Now or Get Left Behind: Why New Regulations Mean Businesses Must Embed Security in Software Design

Author(s):

Stephen de Vries, Co-Founder and CEO, IriusRisk

Adapt now or get left behind

The publication of the US government’s cybersecurity strategy in March 2023, marked the start of a step change in the global cyber and software developer landscape. The strategy itself introduced ground-breaking new proposals, including a plan to introduce liability on manufacturers who build software that is insecure and has been followed by a raft of … Read more

From the Fall 2023 Issue

Developing Apps with Cybersecurity Top of Mind

Author(s):

Saravanan Muniraj, Senior Software Developer, Citizens Property Insurance Corporation

Developing Apps with Security

The explosion of apps being rolled out to the public shows little sign of abating. With that rapid pace of development comes a commitment to cybersecurity since malicious actors use mobile and web applications to breach enterprises and illegally secure personal and financial information. Developing secure apps will significantly increase data security, lower risks to … Read more

From the Fall 2023 Issue

Importance of a Project Plan with Cybersecurity Initiatives

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

project plan with cybersecurity initiatives

Cybersecurity Initiatives are all the rage with every new, trending buzzword and with each active threat or breach that makes its way into the common conversation pool – “We don’t know what it is, but we know we don’t want it!” comes close enough to discussions that happen in board rooms, team chats, and weekly … Read more

From the Summer 2023 Issue

The Accelerators Neutralizing Global Security Threats

Author(s):

Oko Davaasuren, Senior Director, Techstars

The Accelerators Neutralizing Global Security Threats

It is fair to say that the global cybersecurity industry has become an incredibly important sector in recent years. This is largely due to the growing number of threats and attacks, amid the rise of technology-driven business and remote working practices. The global cyber landscape has seen a dramatic increase in cybercrime since the beginning … Read more

From the Summer 2023 Issue

Ease of Use and Maximum Security: What Every App User Wants

Author(s):

Ashok Kumar Padmaraju, Senior Technical Manager (IT Security), Leading Biopharma Organization

what-every-app-user-wants

The appetite for new mobile applications (apps) is growing at an exponential rate and the number of organizations incorporating them into their business models is staggering. Apps make it easier for customers to connect with a company’s products and its online platforms. Mobile apps help businesses build brand loyalty, provide insights into customer behaviors and … Read more

From the Summer 2023 Issue

Defense In Depth and DMZ WEB Server Deployment

Author(s):

Syed Taha Ahmed Jafri, Information Security Specialist,

Defense In Depth and DMZ

Introduction This article will discuss Defense in Depth (DID) in detail and minimum steps to securely deploy a Web server in DMZ for a FinTech 3-tier application. 3-TIER ARCHITECTURE In software engineering the methodology of 3-tier architecture is used to divide an application into logical boundaries. These boundaries are logical and their main benefit is … Read more

From the Summer 2023 Issue

Cybersecurity AI Liability Insurance: Safeguarding Businesses in the Digital Age

Author(s):

Dr. Rebecca Wynn, Chief Cybersecurity Strategist & CISO, Click Solutions Group

AI Liability Insurance

Cyber threats are rising in the digital era, making cybersecurity a top priority for businesses globally. As technology use and handling of sensitive data continue to be prevalent, companies must guarantee they are shielded against cyber-attacks. Cybersecurity AI Liability insurance offers the solution by providing coverage against cyber threats and liabilities. This insurance type assists … Read more

From the Summer 2023 Issue

How Live Patching Can Help Transform a SecOps Team’s Workload

Author(s):

Jim Jackson, President and Chief Revenue Officer, TuxCare

Live Patching

As cyber risk continues to increase across the enterprise, so has the sheer number of tasks and responsibilities of today’s CISOs and their teams. Gone are the days when IT security leadership operated on a largely tactical level, separate from major decisions. Now, these leaders are part of the backbone of their organization, aligning strategic … Read more