From the Winter 2023 Issue

Fighting Against Cybercriminals: Using The FBI’s Out-of-the-Box Approach

Author(s):

Anh Tran, Senior Data Scientist, DevoTeam

Fighting Against Cybercriminals

It is no exaggeration that cybercrime, if not addressed effectively, could change the shape of the economy. Its costs are predicted to reach $10.5 trillion USD annually by 2025, up from $3 trillion USD in 2015, according to Cybersecurity Ventures [1]. If it were measured as a country, cybercrime would be the world’s third-largest economy … Read more

From the Winter 2023 Issue

Dynamic Malware Including Trends from 2022

Author(s):

Meghan Jacquot, Security Engineer, Inspectiv

Dynamic Malware

As cybersecurity professionals, defenders and red teamers, we are well aware of the pervasiveness of malware. Malicious software, written in a variety of programming languages and distributed in many ways, continues to be a main lever in cyber-attacks.  Just as we read articles, attend conferences, and continue our learning, so do threat actors. It is … Read more

From the Winter 2023 Issue

Open Source Software Supply Chain Security

Author(s):

Prabhat Pokharel, CEO, Biz Serve IT

OSS Supply Chain Security

As the world moves toward a digital future, so does the competition and pace of the software development environment. It is causing companies to adopt practices that reduce costs and increase the speed of their software development supply chain while gaining a competitive advantage. An effective software supply chain includes planning, procuring, developing, and deploying … Read more

From the Winter 2023 Issue

Critical Solutions for Enhanced Cybersecurity and Digital Transformation

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Digital transformation is a key component of the modern business landscape. And, with the expansion and prevalence of digital devices, networks and systems — comes an ever-greater risk of cybersecurity threats that could potentially create major disruptions or downsides. This emphasizes that organizations must strategically address cybersecurity in their digital transformations, to ensure the successful … Read more

From the Winter 2023 Issue

What Now? Updates on Recruiting Cybersecurity Professionals

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

What Now Recruiting

In Fall 2015, we discussed cybersecurity recruiting and the focus was on recruiting more veterans into cybersecurity positions to provide diversity, leadership and an already experienced, trained workforce to fill the thousands of job vacancies. While more recruiting of veterans in cybersecurity is still highly advocated, the overall landscape for cybersecurity recruiting has drastically changed … Read more

From the Winter 2023 Issue

Managing Security “In” and “Of” the Cloud

Author(s):

Daniel Deeney, Co-Founder & CEO, Paladin Cloud

Many digital transformation initiatives today involve a strategic move to the cloud to capture the key benefits of scalability, flexibility, and reduced cost for the modern enterprise. However, a new security paradigm is emerging in the cloud where enterprises lack visibility into applications and data, struggle to identify and secure cloud assets, and grapple with … Read more

From the Winter 2023 Issue

Understanding New Cybersecurity Risks in Cloud Computing

Author(s):

Michael Silbernagel, Senior Security Analyst, SysGen

New Risks in Cloud Computing

Cybersecurity is quickly becoming a prioritized concern for businesses. Cybersecurity impacts business daily in the form of access, availability, and integrity of data but also affects businesses’ long-term credibility and reputation. Engaging in solid cybersecurity practices is urgent as new threats and knowledge come to light daily. The future of business in the digital age … Read more

From the Winter 2023 Issue

CISOs: Top 5 Strategies to Get Ready for the Quantum Threat

Author(s):

Skip Sanzeri, FOUNDER and COO, QuSecure, Inc.

Quantum Threats

Quantum computers are very powerful machines that utilize subatomic properties offering humanity an amazing advancement to solve many unsolvable problems. Unfortunately, quantum computers are very good at breaking the existing cybersecurity the world uses today. In short, quantum computers will threaten our data and privacy to the extent that this will force the largest technology … Read more

From the Winter 2023 Issue

When It Comes To SAP, Don’t Be A “SOAR” Loser

Author(s):

Christoph Nagy, CEO, SecurityBridge

SAP - SOAR

Irrespective of whether you are starting your career in information security or have years of experience in this field, you might realize that you are part of an unfair game. Why is that? An army of attackers composed of kids, organized crime, and nation-state hackers are coming after your information. However, most companies need more … Read more

From the Winter 2023 Issue

Level-up API Protection with Identity and Centralized Trust

Author(s):

Gary Archer, Product Marketing Engineer, Curity

Level-up-API

Introduction API security has matured over the years, and the best practice has moved away from older security methods such as API keys. Token-based authentication is the norm, but too often, a significant concern is overlooked: identity. An identity focus is critical for modern APIs to mitigate risk and prevent cyber-attacks. In this article, we … Read more