Cyber Security

 

The Business Plan of Cyber Criminals (Arm Blueprint)

In cybersecurity, 2005 is a year that looms large. It marked the moment when cybercrime graduated from a malicious and somewhat sophisticated sport to a business with money, inform... More

INTRUSION Demonstrates AI-Powered Cybersecurity Solution at GSX 2021 (SIW)

INTRUSION's Shield solution uses IP reputation to understand when a “bad” device or piece of software is going to do a “call home” or try to get something through the organ... More

Is There Too Much Transparency in Cybersecurity? (CD)

Between information sharing, software accountability, or incident response and disclosures, companies have to find the disclosure sweet spot.... More

NICE Actimize Establishes Strategic Partnership With Tata Consultancy Services to Expand Markets for Financial Crime Solutions

TCS’s comprehensive set of services in the financial crime domain include consulting, analytics, transformation and technology solutions, platform solutions, and change managemen... More

Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up (SI)

Speed is of the essence in digital defense. As the latest Ponemon Institute Cost of a Data Breach Report makes clear, businesses and agencies that are able to respond to and contai... More

The New Math of Cybersecurity Value (CSO)

An increasing number of CISOs are devising a new set of metrics to show how they’re impacting risk at their organizations.... More

Remote Work is Here to Stay – Here are the Cybersecurity Risks (Protocol)

Phishing and ransomware are on the rise. Is your remote workforce prepared?... More

Mission Probable: Access Granted (Security Intelligence)

Your facilities are most likely vulnerable to a physical intrusion. This is not an indictment of any organization’s security program. If intruders have enough time and are motiva... More

Palo Alto Networks Introduces Prisma SASE

Palo Alto Networks introduced Prisma SASE, bringing together Prisma Access and Prisma SD-WAN into an integrated cloud-delivered service with industry-leading network security and n... More

What a Hybrid Workforce Needs is Hybrid Security (Tech HQ)

As organizations hope to implement a hybrid working model, having a hybrid security plan is also crucial. While organizations were initially hoping to have their employees back wor... More

Know Your Enemy: How Pirates Attack Watermarking (Synamedia Blog)

Watermarking. You know what it is, and why it’s important for detecting the source of a leaked video stream. But there are several different configurations out there. So which is... More

5G and Cybersecurity – A Realistic Path Forward (CPO)

5G Technolgy has been increasing in popularity among the telecom companies creating it and organizations that consume wireless networks. The reasons for this are not trivial. It is... More

Cybersecurity is Tough Work, so Beware of Burnout (ZDNet)

Working in cybersecurity can be challenging, but it's important for information security professionals to maintain a healthy work/life balance – otherwise they risk burnout.... More

Why a Ban on Ransom Payments Will Not Work (CD)

Those most impacted by an attack are motivated to pay. In some cases, it's not the victim company but its customers who want service restored.... More

Machine Identity Remains a Mystery, Threatening Digital Security (CD)

As more companies undergo digital transformation and embrace hybrid cloud and multicloud environments, the number of machines that must be identified increases. Companies also need... More

Cyber Insecurity (Vistex Blog)

Global cyberattacks in the manufacturing industry have increased by almost 3,000% since 2012. This gives manufacturers like you a dubious distinction in the world of cybersecurity,... More

Fighting Cyber Threats With Open-Source Tools and Open Standards (Security Intelligence)

Detecting cyber threats is usually the first critical step in the mitigation of cyber attacks. Common means to achieve this goal are rules or analytics that track network and syste... More

Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Decipher)

For as long as there have been computers, there have been bugs. That’s damn near 100 years and an uncountable number of bugs. If they were discovered at all, most of those bugs w... More

The Top 5 Security Challenges for Retailers (Avanade Insights)

Protecting the brand from cyber threats as well as supporting investments to transform the business is an immense challenge, putting acute pressure on Chief Information Security Of... More

Palo Alto Networks Adds Cloud Misconfiguration Tool (Security Boulevard)

Palo Alto Networks revealed that its Bridgecrew by Prisma Cloud offering has been extended using another tool that now makes it possible to also detect configuration drifts across ... More

Sign up for our newsletters
* indicates required
MESA Newsletters