SWEEPS Educational Initiative Offers Application Security Training
The secure coding curriculum was developed by University of California, Davis; University of Maryland Baltimore County; Worcester Polytechnic Institute; California…
The secure coding curriculum was developed by University of California, Davis; University of Maryland Baltimore County; Worcester Polytechnic Institute; California…
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure…
by Victoria Hargrove, Reporter, CDM In today’s society, digital threats are happening at a consistent and concerning rate. Traditional authentication…
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for…
The European Union's Digital Operational Resilience Act requires financial entities to focus on third-party risk, resilience, and testing.
Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that…
Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their…
The ever-evolving landscape of data security demands constant vigilance, especially for those handling Controlled Unclassified Information (CUI). A presentation by…
In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi-factor authentication…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…