Cyber Security

 

IT Security Budgets Triple as Businesses Confront More Cyberattacks (CD)

The cost of combating cyberthreats has soared the past five years, as median IT security budgets more than tripled to $5.3 million in 2022, compared with $1.4 million in 2018, acco... More

What to Expect From the Upcoming National Cyber Strategy (SC)

For decades, Washington policymakers have struggled over meaningfully addressing the collective cybersecurity risks that are brought on by the internet and shared by governments, c... More

AWS Debuts ‘SOAR’ Security Whitepaper

Cybersecurity has evolved enough to merit its own automation tools. The value of security orchestration, automation, and response (SOAR) is in reducing the human effort of performi... More

Five Compelling Benefits of a Managed SASE Solution (Palo Alto Networks Blog)

Traditional security solutions were not designed with the cloud in mind, creating complexity with network infrastructure, which results in extensive administrative costs and incomp... More

Economic Volatility to Exacerbate Cyber Risk In 2023 (Cybersecurity Dive)

Difficult decisions about personnel and budgets can create or increase cybersecurity risks by reducing spending or deferring costly but important updates to operating environments ... More

How Cybercriminals are Operationalizing Money Laundering and What to Do About It (DR)

It's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.... More

Fastly: Delivering Super Bowl For More Than a Decade

2023 marks the 11th year of Fastly’s involvement in the Super Bowl. Back in 2013, we secured dedicated bandwidth to online businesses advertising throughout the game. However, si... More

The Latest Cybersecurity Threats and How to Detect and Mitigate Them (Edgio Blog)

Cybersecurity threats are constantly evolving, and it's essential for businesses and individuals to stay informed about the latest threats and how to protect against them.... More

Measuring Cybersecurity: The What, Why, and How (CSO)

CISOs need to report the key security performance and risk indicators to executive teams in way that they find meaningful and actionable.... More

Fortinet Helps Launch The Cybercrime Atlas Initiative

Fortinet announced the launch of the Cybercrime Atlas, a joint initiative launched in Davos at the organization’s Annual Meeting by the World Economic Forum (WEF) with the suppor... More

Are Threat Actors Using ChatGPT to Hack Your Network? (Security Intelligence)

Though the technology has only been widely available for a couple of months, everyone is talking about ChatGPT.... More

Palo Alto Networks Cortex and IBM Enhance Modern Incident Response

IBM Security X-Force has partnered with Palo Alto Networks to complement its existing, industry-leading capabilities with the Cortex product portfolio. This will allow customers to... More

Interpol Working Out How to Police the Metaverse (BBC)

Interpol secretary general Jurgen Stock says the global police agency is investigating how the organization could police crime in the metaverse. The metaverse is the widely-discuss... More

EZDRM: Reflecting on 20 Years of Streaming Security Innovation

We reflect on some of the lessons of our time in business, and voice our gratitude for the support of customers, partners and colleagues along the way.... More

Securing the Metaverse: 3 Cyber Concerns (FC)

The metaverse has many potential opportunities, but we must be aware of the security risks and start addressing them now.... More

Why 2023 Is the Time to Consider Security Automation (EP)

Security is the top automation priority among global IT leaders today – here's why it should be yours too.... More

Fortinet Fortifies FortiGate Firewalls With 5th-Gen Custom ASIC (SDxCentral)

Fortinet introduced its latest custom ASIC to power its next generation of entry and mid-range FortiGate firewalls. The vendor touted the new chip as offering better firewall perfo... More

Box CEO on the ‘Perfect Storm’ of Challenges In Cybersecurity (CD)

The shift to interconnected operations and an expansive distribution of work has created a “perfect storm of complicated challenges” for cybersecurity, Box CEO Aaron Levie said... More

Third-Party App Stores Could Be a Red Flag For iOS Security (Security Intelligence)

The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European... More

Five Ways to Get the Chief Information Security Officer Role Right (CPO)

The growing reliance on technology is making organizations increasingly vulnerable to cyber-attacks. Technology underpins most organizational processes, business growth is powered ... More

Sign up for our newsletters
* indicates required
MESA Newsletters