IBM Announces New Guardium Data Encryption v3.0 Portfolio (IBM Security Intelligence)

Data is leaking from enterprises in large quantities. Data leakage resulting from security breaches is not strictly the problem, however: The problem begins when sensitive data tha... More

AI Cyberattacks are Coming – But What Does That Mean? (The Conversation)

The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 industry professionals, out of the 100... More

Philips Takes on Cinema Piracy with New Ambient Light Tech (ZDNet)

Content creators and cinemas have tried everything from piracy-busting patrols to embedded watermarks, but nothing seems to be making a dent in film piracy. So-called "cam" copi... More

IBM, Lastline Partner on Advanced Malware Protection Offering (CDSA)

Advanced network-based malware protection firm Lastline. has been selected by IBM Security to power its suite of network protection solutions and the IBM X-Force Exchange collabora... More

Okta, Preempt Integrations Help Enterprises Simplify ID Verification to Tackle Threats in Real-Time (CDSA)

Behavioral firewall company Preempt has announced technology integrations with Okta, the independent provider of identity for the enterprise. These integrations allow custom... More

3 Ways Blockchain Is Revolutionizing Cybersecurity (Forbes)

The second quarter of 2017 was a wild one for blockchain companies and investors, with nearly 60 initial coin offerings (ICOs) closed in the quarter for more than $750 million, and... More

Stanbury: Third-Party Audits More Crucial Than Ever

It’s a truth about the state of content security today: while the level of effort to cause damage coming from hackers and content pirates is surprisingly low, the level of effort... More

Caringo: Object Storage Helps Protect Data from Ransomware

Amid concerns over high-profile ransomware attacks, protecting data is a growing concern for many organizations. Object storage solutions may offer some relief. That’s accordi... More

NSS Labs: Choose Wisely with Next-Gen Firewalls

To help stop emerging cybersecurity threats at the perimeter, enterprises are looking at a bevy of next-generation firewall (NGFW) options today, controls that feature all sorts of... More

Following the Kodi Crackdown (OTT2)

In the media industry, there’s no dirtier word right now than “Kodi.” The popular media management software is under siege, and the once vibrant ecosystem that supported it i... More

Three Ways to Protect Your Data in the Cloud (Time)

For consumers, the cloud is a big blessing: It lets them store huge amounts of information—music, messages, photos and so on—at little or no cost. Thanks to a wide array of ser... More

IBM: 6 Ways Businesses Can Protect Against Ransomware Like Petya (Forbes)

On June 27, organizations in over 65 countries reported they had been infected with Petya ransomware. Petya ransomware was first discovered in March 2016, and like most malware, it... More

Why Enterprise Security Needs a New Focus (DarkReading)

WannaCry appeared to be the catastrophic global cybersecurity breach we've long been expecting, but despite the damage caused, the full possible magnitude of the threat was never r... More

Oracle Adds AI, Machine Learning Tech to Cloud Security Offerings (CDSA)

Building on the positive response to its Identity-based Security Operation Center (SOC) cloud services, Oracle has announced a series of developments that enhance the portfolio's ... More

Simple Ways to Avoid Malware Across Devices (TechRepublic)

If the recent WannaCrypt attack is any indication, the continued wave of malicious software is not about to fade into the distance. And so, everyone with a keyboard and a mouthpiec... More

Your SaaS Provider May Not Have Your Security Covered (SC Media)

As the first decade of cloud computing draws to a close, confidence in the way SaaS- and cloud service providers manage data protection and security is very high. Occasionally surv... More

LADB First Post-Production Service Certified Under ISO 22301

Los Angeles Duplication & Broadcasting (LADB) announced May 24 that it’s been certified under the International Organization for Standardization (ISO) standard 22301, making ... More

Fortium Technologies, Object Matrix Partner on Content Security Solutions for Improved Media Protection

Object Matrix and Fortium Technologies have launched a joint solution offering secure media management for digital content archive storage. It combines security certified solutions... More

The Best Digital Offense Starts With the Best Security Defense (Cisco)

We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More

Cyberattacks Again Roil Hollywood … Can Anything be Done About It? (L.A. Times)

Like most large corporations, major Hollywood studios are fond of outsourcing. From coming attraction trailers that are designed to draw audiences into cinemas to eye-popping 3D... More