cyber defense

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...
How Breach Readiness Will Shape Cyber Defense in 2025
Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned ...

NAC or Microsegmentation: When is One More Appropriate?
In today’s complex security landscape, businesses often wonder if Network Access Control (NAC) and microsegmentation serve the same purpose. While both contribute to securing networks, they address fundamentally different problems. This blog ...
Antifragility – The Essential Strategy for Modern Cyber Defense
This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which ...

Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes
Shriram Sharma | | AI tribes, Analogizers, artificial intelligence in security, Bayesians, Connectionists, cyber defense, Evolutionaries, Industry, machine learning cyber security, Symbolists, threat detection
Learn about the five key machine learning approaches outlined in the best selling AI book, The Master Algorithm, and their use cases in the field of cybersecurity. The post Machine Learning in ...

The New Era of Cybersecurity: Gartner’s Vision for Preemptive Defense
Joe Ariganello | | Blog, cyber attacks, cyber defense, Cyber Threats, Cyber-attack, Cybersecurity, Cybersecurity Industry, Cybersecurity News, Gartner, Preemptive Cyber Defense
Gartner's report, Emerging Tech: Top Use Cases in Preemptive Cyber Defense, highlights the emergence of preemptive cyber defense technologies as a game-changing approach to cybersecurity ...

How U.S. Businesses can Fight the Deepfake Threat
While it's unclear how new, advanced technologies like AI and ML will ultimately change the data security landscape, now is not the time to stand still ...
Security Boulevard
APT28 HeadLace Malware Targeting European Networks Unveiled
Wajahat Raja | | Advanced Persistent Threats (APT), APT28, BlueDelta, credential harvesting, cyber defense, Cyber Espionage, cyber warfare, Cybersecurity News, cybersecurity threats, European Networks, Fancy Bear, Geofencing Malware, HeadLace Malware, Iron Twilight, LOLbins, Nation State Cyberattacks, Network Security, Russian GRU, spear-phishing, state-sponsored-hacking, Ukraine Cyber Attacks
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidious HeadLace malware at the heart of the storm. This malevolent software, attributed to the Russian GRU-backed ...
CSBR Slams Microsoft Over Storm-0558 Attacks | Key Insight
Wajahat Raja | | Cloud Security, CSBR, cyber attacks, cyber defense, Cybersecurity, Cybersecurity News, Data breach, Incident Response, Microsoft, nation state threats, risk management, Security Lapses, Storm-0558, Technology Industry, Vulnerability Management
In recent news, the U.S. Cyber Safety Review Board (CSBR) has raised concerns over Microsoft’s handling of the Storm-0558 attacks, highlighting significant security lapses that allowed a China-based nation-state group to breach ...