Research

 

Fortinet: What’s Next for Network Firewalls?

Firewalls have come a long way from their humble beginnings of assessing network traffic based on appearance alone. Today’s next-generation firewalls (NGFWs), which must protect ... More

7 Things Your Ransomware Response Playbook Is Likely Missing (Dark Reading)

Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?... More

Criminal Intent: Inside Bonus Abuse and Identity Theft (Sports Handle)

When you think about sports betting, the words “ringleader,” “dark web,” or “fraudsters” don’t necessarily come to mind. But those words offer a window into bonus abu... More

The Most-Requested Update For Fastly Developer Accounts

You asked, Fastly delivered — run your first two domains free on a Fastly developer account.... More

Techno-Plagiarism and the Battle For Music in a New Age of AI (Synctank)

At the heart of the uproar about generative AI and music is the argument that if you feed existing songs/recordings into an AI tool to “train” it, the end result will effective... More

The 4 Most Common Misconceptions About Mobile Anti-Tamper Technology (Irdeto Insights)

Mobile game hacking is continually adapting its approach to pirate titles and distribute them both to suspecting and unsuspecting gamers. Just to give you an idea of the size of th... More

Fortinet: Key Findings From the 2H 2022 FortiGuard Labs Threat Report

In the first half of 2022, FortiGuard Labs observed an overall increase in attack frequency paired with the explosive growth of new variants associated with familiar tactics. While... More

Vishing With Synthetic Voice (Richie May Blog)

Vishing social engineering phone calls are on the rise and show increasing velocity. Vishing is a type of social engineering attack where a malicious attacker calls their target to... More

The Importance of Multi-CDN In Two Charts (Fastly Blog)

When content delivery networks (CDNs) garner coverage in the media, it's almost always because of an outage. Yet, outages are not a major reason to move to adopt multiple CDNs. It'... More

A Closer Look at DDoS Attacks (Fastly Blog)

Before protecting against a Denial of Service (DOS) attack, you must understand what one is. A DoS attack is a malicious attempt to impact the availability of a targeted system. Th... More

A Closer Look at Cyber Resiliency for Operational Technology (Fortinet Blog)

Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to ... More

Digital Transformation and Risk Management Must Go Together (Security Intelligence)

Common understandings are the key. The benefits can be extremely positive if they exist and consequences downright painful if they do not. Your staff and decision makers can get st... More

Ransomware Attacks on Retailers Rose 75% in 2021 (CSO)

Securing cyberinsurance coverage for retail organizations has become difficult because of the increasing number of attacks.... More

IBM Security Leader Talks Political Impact on Fintech (FM)

Corey Hamilton, Partner Director, IBM Security Services, discusses how political instability is de-stabilising fintech and the sectors most at risk.... More

Convergent Risks Expands AppSec Services With New Hire

Convergent Risks, a leading provider of site, cloud and application security assurance and testing services for the media and entertainment supply chain, has expanded its applicati... More

Vision Media Selects EZDRM to Offer Robust Video Security

Vision Media has recently selected EZDRM to help add an additional level of workflow integration to their leading secure screening platform. Vision Media is working with EZDRM to i... More

5 Key Considerations for Your 2023 Cybersecurity Budget Planning (CSO)

An evolving threat landscape, regulatory requirement changes, and increases in cyber insurance are among leading factors that will impact next year's security budget.... More

DeepFake Epidemic is Looming – And Adobe is Preparing for the Worst (Forbes)

“You can argue that the most important thing on the Internet now is authentication of content,” Adobe CEO Shantanu Narayen tells Forbes. “When we create the world's content, ... More

Tips for Managing Unstructured Data Security (archTIS Blog)

Unstructured data security should include stringent centralized access controls and protections to ensure only the right users – have access to the right content – at the right... More

Companies Cannot See – or Protect – Nearly Half of All Device Endpoints (CD)

The average U.S. enterprise is running about 135,000 endpoint devices, half of which IT departments cannot observe , leaving security operations staff unable to detect threats or e... More

Sign up for our newsletters
* indicates required
MESA Newsletters