article thumbnail

Whitepaper: The Intersection of Technical Debt and Cybersecurity

Approachable Cyber Threats

Category Guides, Cybersecurity Fundamentals. With such a wide net, understanding how technical debt impacts your business and cybersecurity efforts can be a challenge. Risk Level. Don’t worry about that documentation for now.” “We We only have one person that knows how to fix this code.” “We DOWNLOAD IT NOW (FREE).

article thumbnail

MITRE introduces D3FEND framework

Malwarebytes

The MITRE Corporation is a non-profit organization with the mission to “solve problems for a safer world” It wants to bring security focused communities together to develop more effective cybersecurity. The “tailor defenses against specific cyber threats” immediately gave me the mental image of a game of whack-a-mole.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Small and medium businesses need their own federal cyber policy, say advocates

SC Magazine

Small and medium businesses often have distinct challenges tied to cybersecurity. Small to medium sized businesses have drastically different cybersecurity preparedness, capacity and overall posture than their king-sized brethren. Hiring a dedicated cybersecurity employee in a 10-man office is increasing the workforce by 10%. “I

article thumbnail

Life, Liberty, and the Pursuit of Security

Security Boulevard

As cyber threats evolve, organizations of all sizes need to ramp up their security efforts. LogicHub’s intelligent automation platform uses advanced AI, machine learning, and automation to perform detection and response — and proactively hunt threats. Threat hunters are highly skilled and demand sky-high salaries.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Researchers often provides the cybersecurity community with a helpful snapshot on a particular issue. The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. “Uncertainty is no longer a good reason for failing to prepare for future cyber threats.”

article thumbnail

Protect 5G to Secure Sustainable Growth

Thales Cloud Protection & Licensing

5G will not only enable these billions of devices to provide a wide range of services, but it will also result in a huge expansion of the cybersecurity threat landscape, as more business operations become targets for criminals, both individual and state-sponsored. Protecting 5G from cyber threats.

article thumbnail

The Evolving Role of the SOC Analyst

Security Boulevard

As the cyber threat landscape evolves, so does the role of the security operations center (SOC) analyst. Cybersecurity industry veteran and OneTrust VP of Security, Colin Henderson, says organizations must avoid hiring armies of specialists for repetitive tasks. It’s a brave new world for cybersecurity.