Technology

 

Fortinet Unveils New Digital Risk Protection Offering to Empower Security, Exec Teams With an Attacker’s View of the Enterprise

FortiRecon uniquely delivers a triple offering of outside-in coverage across External Attack Surface Management (EASM), Brand Protection (BP), and Adversary-Centric Intelligence (A... More

Massive Facebook Messenger Phishing Operation Generates Millions (BC)

Researchers have uncovered a large-scale phishing operation that abused Facebook and Messenger to lure millions of users to phishing pages, tricking them into entering their accoun... More

Navigating IT and OT Convergence (Irdeto Blog)

A question frequently confronted at Irdeto concerns the seemingly inevitable convergence of IT (Informational Technologies) and OT (Operational Technologies) systems. Clearly, such... More

IBM Develops AI-Powered z16 to Help Thwart Quantum Cyber Attacks (Security Intelligence)

IBM unveiled IBM z16, the company’s next-generation system with an integrated on-chip artificial intelligence (AI) accelerator to deliver latency-optimized inferencing. With this... More

Alcineo Deploys Verimatrix Threat Defense Technology to Protect SoftPOS Terminal Solutions for Banks, Payment Providers

As part of Verimatrix’s threat defense offerings, Verimatrix Code Shield plays a pivotal role in progressing the certification process for Alcineo’s SoftPOS SDK, that serves tr... More

The CISO of Tomorrow (IDG)

It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could ... More

Why AI-Powered Ransomware Cyberattacks Could be Coming Soon (Protocol)

Hiring AI experts to automate ransomware could be the next step for well-endowed ransomware groups that are seeking to scale up their attacks.... More

Palo Alto Networks Partners With BT to Offer Managed SASE

As organizations are developing new ways to accelerate their digital transformation and accommodate the new hybrid workforce, Secure Access Service Edge (SASE) is becoming the mode... More

Are Biometrics as Safe as We Think? (Raconteur)

Fingerprints, voice, and facial recognition have all been touted as the next step in the evolution of online security. But should we hand over our unique physical traits so readily... More

Security Leaders Chart New Post-CISO Career Paths (CSO)

The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.... More

AI for Cybersecurity Shimmers With Promise, but Challenges Abound (Dark Reading)

Companies see AI-powered cybersecurity tools and systems as the future, but at present nearly 90% of them say they face significant hurdles in making use of them.... More

FBI: Business Email Compromise is a $43B Scam (Bleeping Computer)

The Federal Bureau of Investigation (FBI) said that the amount of money lost to business email compromise (BEC) scams continues to grow each year, with a 65% increase in the identi... More

5 Data Security Challenges and How to Solve Them (Security Intelligence)

To prepare to defend your data, you need a strategy that can keep up with today’s environment. You want to be an innovator, a trendsetter and, most of all, a security leader. Tha... More

5 Reasons Why Security for Apps is Good for Your Business (Irdeto Blog)

The mobile gaming industry is growing at a fast rate. By 2023 there will be about 3.7bn mobile gamers worldwide and that alone is a good enough reason to provide positive and secur... More

Why Netflix and Other Streamers are Cracking Down on Password Sharing (LA Times)

As competition for customers among streaming services heats up, so has the proliferation of online marketplaces where passwords are being sold illegally at bargain-basement prices,... More

Top 5 Questions to Answer for a Smooth Transition to DRM (BuyDRM Blog)

Are you considering adding DRM to your streaming workflow? Want to save time and avoid headaches? Here are a few things that you will want to consider before diving headfirst in th... More

Security Threats to Mobile Gaming Apps 101 (Irdeto Insights)

Mobile gaming apps have always been targets of pirate and hacker attacks. What has changed recently, though, is the sophistication of ways in which they bypass, cheat, modify or pi... More

15 Ways to Protect Data With Digital Security Watermarks (archTIS Blog)

Digital security watermarks provide a simple solution to warn users about the sensitivity and intended audience of a document to prevent mishaps. And, when all else fails, they can... More

Cincinnati Public Library Safeguards Digital Archives and Bolsters Disaster Recovery With Qumulo

As they look to the future, CHPL realizes the importance of protecting their data as ransomware and natural disasters pose ongoing threats. They have a second Qumulo cluster for di... More

PC Anti-Tamper Technology Worries Tamed (Irdeto Blog)

Game hackers are becoming more sophisticated and are continually adapting their approach to pirate titles from game developers and publishers, and distributing them to suspecting a... More

Sign up for our newsletters
* indicates required
MESA Newsletters