Cyber Security

 

IBM Cybersecurity Hub to Mitigate APAC Cyberattacks (TWA)

In a move that has the potential to revolutionize cybersecurity training, IBM virtually inaugurated its Cyber Range and IBM Security Command Center. The center located in Bengaluru... More

5 Cybersecurity Spending Areas to Evaluate (CFO)

As computing environments change and bad actors switch tactics, most organizations will need to increase or redirect their investment in cybersecurity.... More

Ransomware Victims are Paying Up – But Then the Gangs are Coming Back for More (ZDNet)

Cybersecurity experts warn against paying ransoms - this is why.... More

Want Real Cybersecurity Progress? Redefine the Security Team (TNS)

If businesses want to see progress on the cybersecurity front, they’ll need to change this state of affairs by making security a collective responsibility.... More

Five Reasons Why Hackers Do Not Want You to Consolidate Your Security Toolset (Edgescan Blog)

While cost reduction and tool management bandwidth concerns might be why you are considering Security Tool Consolidation – the Hacker has a different agenda. They are counting on... More

Equinix, Cisco Deliver End-to-End Virtual Firewall Security (Interconnections)

Applications and remote environments give rise to the need for flexible and agile security. A virtual firewall is a network security solution designed for cloud environments or whe... More

Pivot to a Secure Cloud with Automation (TCS Blog)

Today’s enterprises want to rapidly adopt multi-cloud to accelerate their digital transformation goals. However, moving to a multi-cloud alone cannot be a silver bullet unless yo... More

Edgescan Sets Partnership With Manicode

Edgescan announced a partnership with Manicode Security, the secure coding education company. With a combination of lecture, security testing demonstration, and code review, Manico... More

Riscure Introduces Riscuberry for Embedded Systems Security Training

The IoT target Riscuberry serves multiple purposes. Riscuberry is not only an up-to-date target for embedded security training but also a training target for FI and SCA. Riscuberry... More

Will the Metaverse Usher in a Universe of Security Challenges? (Security Intelligence)

As more human activity takes place in virtual spaces, the challenges around security will become more important. The shift from today’s VR to tomorrow’s metaverse is mainly abo... More

Palo Alto Networks Detects ‘Nebula’ Threats With OS, Hardware Upgrade (SDxCentral)

Palo Alto Networks introduced the latest version of its PAN-OS software, dubbed Nebula, for sophisticated, zero-day attack detection along with new additions to its hardware firewa... More

Irdeto Watermarking Completes Cartesian Robustness Test (RTN)

Digital platform cybersecurity prover Irdeto’s TraceMark forensic watermarking embedding and detection technology has successfully completed a thorough Farncombe Security Audit W... More

Security Strategies Evolve While Spending Flatlines (CD)

Surprisingly, IT security spending has been flat for several years, recent data from Gartner show, but that doesn't mean organizations are standing still. Investment in new securit... More

Cybersecurity and Forensic Accounting Join Forces to Combat Criminals

Not a day goes by without breaking news of a sophisticated white collar crime scheme perpetrated against a corporation, government entity or individual. In the era of digital trans... More

archTIS, Threat Protect Announce Partnership

archTIS and Threat Protect announced a new partnership to add archTIS’ attribute-based access control (ABAC) information security solutions to Threat Protect’s comprehensive ra... More

Microsoft Introduces Cyber Signals to Help Defend Against Cyber Threats (TR)

The new informative reports will evaluate the tactics, techniques and strategies used by cybercriminals to help security, information and privacy officers, and their teams, to impl... More

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware (Security Intelligence)

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryp... More

Palo Alto Networks Makes the Business Case for DevSecOps (SDxCentral)

Organizations can increase employee productivity and earn a better return on their security investments by shifting cloud security left at the infrastructure and application layer,... More

SAP, Yale University to Empower the Next Generation of Cybersecurity Professionals

SAP announced a new agreement with Yale University’s Jackson Institute for Global Affairs to foster early cybersecurity talent and promote diversity in the field. (more…)... More

CIO Involvement in Security Grows as CEOs Target Risk Reduction (CD)

Half of CIOs are prioritizing security management this year, as CEOs push for IT and data security upgrades to reduce corporate risk, according to a new survey. The majority of IT ... More

Sign up for our newsletters
* indicates required
MESA Newsletters