Cyber Security

 

Cheating, Tampering and Piracy in Gaming: Are You Worried Enough? (Irdeto Blog)

If you’re a game developer, you’re probably very well aware of all the different risks that cheating, tampering and piracy mean to player engagement and your business. Decrease... More

FBI: Cybercrime Victims Suffered Losses of Over $6.9B in 2021 (Dark Reading)

he Internet Crime Complaint Center fielded 847,376 cybercrime reports last year, an increase of 7% from 2020.... More

How to Build a Culture of Cybersecurity (MIT)

Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture.... More

Palo Alto Networks CEO: I’ve Never Been Worried About Cybersecurity More Than Now (CNBC)

Nikesh Arora, Palo Alto Networks CEO, joins ‘Closing Bell’ to discuss his thoughts on cybersecurity concerns due to the ongoing conflict in Ukraine.... More

It’s Not Fair, But Cybercrime is Cheap (Security Intelligence)

It may not be fair, but cyber crime is cheap. How cheap? You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get... More

Starting at Home: Cybersecurity in the Hybrid Workplace (Security Intelligence)

As people settle into the late stages of the pandemic, the hybrid workplace is not going anywhere. Therefore, the enterprise must address the increasing number of entry points into... More

Global VPN Market Set to Skyrocket in 2022 (IT Pro)

The Asian-Pacific region is expected to see the highest growth rates over the next four years.... More

Prisma Cloud Supply Chain Security: Reducing Code Complexity and Risk (Palo Alto Networks Blog)

Cloud native supply chains have been highly tuned to meet the demands of DevOps speed and innovation. They are typically made up of containers and infrastructure as code (IaC) with... More

New IBM Cybersecurity Hub to Help Asia Pacific Organizations Build Cyber Resiliency

The centerpiece of this investment is the new IBM Security Command Center, the first of its kind in the region, for training cybersecurity response techniques through highly realis... More

Why the Future of Cybersecurity Rests in Developers’ Hands (Forbes)

According to a recent survey, over one-quarter of U.S. consumers have not taken any steps to protect their digital/online privacy - and that means it is more important than ever fo... More

How Blockchain Could Revolutionize Cybersecurity (Forbes)

More distributed software deployment, database management and security protocols could render targets less vulnerable by spreading attack surfaces and relying less on centralized t... More

How Cybercriminals Exploit QR Codes to Their Advantage (CISO)

With new kinds of cyber threats predicted to surge in 2022, users should be vigilant about the risks involved and think before scanning their next QR code.... More

Why Companies are Moving to a ‘Zero Trust’ Model of Cybersecurity (CNBC)

The latest catchphrase in cyber security might as well be “don’t trust anyone — or anything.” The zero trust model of security, which takes the approach that no users or de... More

The Cybersecurity Challenges of Working From Anywhere (Forbes)

The shift to remote working during the pandemic coincided with a significant rise in cybersecurity incidences as criminals sought to take advantage of both the stress and disruptio... More

Hybrid Work is Here to Stay, and Peering Can Help Support It (Interconnections)

2021 was a record year for distributed denial of service attacks, and this year is shaping up to be even worse. The shift to hybrid work has exacerbated these trends. It’s create... More

2022 May be the Year Cybercrime Returns its Focus to Consumers (Bleeping Computer)

Cybercriminals like to follow the shortest and most accessible pathway to achieving their goals, and when it comes to targeting corporate networks, the best chances lie at targetin... More

How Palo Alto Networks Modernized its Security Management With AI (ZDNet)

Palo Alto Networks introduced its Cortex XSIAM, which can be viewed as a modernized SIEM with an infusion of artificial intelligence. The concept of the XSIAM is that it uses AI to... More

How AI is Shaping the Cybersecurity Arms Race (The Conversation)

AI is an intriguing tool that could help stem the tide of cyberattacks and, with careful cultivation, could become a required tool for the next generation of cybersecurity professi... More

Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022 (Security Intelligence)

For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This was among... More

SAP Teams Up With HBCUs to Attract Talent to the Cybersecurity Curriculum

SAP shared plans to sponsor several historically black colleges and universities starting with Hampton University and those of the Atlanta University Center Consortium – Clark At... More

Sign up for our newsletters
* indicates required
MESA Newsletters