Technology

 

Palo Alto Networks Joins Microsoft 365 Networking Partner Program

Palo Alto Networks has joined the Microsoft 365 Networking Partner Program to provide direct and efficient connectivity for Microsoft 365 users through the industry-leading Prisma ... More

The Top Insider Data Loss Causes, Preventions (archTIS Blog)

Companies are reporting sharp increases in data loss spurred by remote and hybrid work. How is this occurring with all the security measures and tools enterprises have in place? In... More

Pioneering Data Privacy Across Digital Analytics With Amplitude and Transcend

As our world becomes more and more digital, companies track an increasing amount of user behaviors to help their products run efficiently and provide insights for their teams.... More

Protecting Your Data From a Unique Threat: Misinformation (Security Intelligence)

The value of data isn’t lost on most cybersecurity leaders, but data is simply information. And what if that information is actually misinformation? Or disinformation? How can yo... More

Irdeto Launches First-to-Market Hybrid Satellite RDK Video Accelerator

Irdeto announced the launch of Irdeto RDK Hybrid Stack, a multiplatform hybrid satellite RDK video accelerator. With this launch, Irdeto now offers pay-TV operators the choice of t... More

7 Holiday Cybersecurity Tips to Try Before The Year Ends (Security Intelligence)

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurr... More

QR Codes Have Gone Mainstream – and Cybercriminals are Taking Advantage (Tech Monitor)

From 'QRLjacking' to 'quishing', organizations must be aware of the cybersecurity risks of QR codes as adoption grows.... More

Embedding the Headend Watermark: When to Do it … and Why? (Synamedia Blog)

Should you insert the watermark before or after encoding? A simple question perhaps, but the answer can have big consequences. We’ve done our homework, so you don’t have to.... More

Irdeto Launches HbbTV Operator Application (DTE)

Hosted on Irdeto’s CI Plus conditional access modules, Irdeto OpApp enables pay TV operators to deliver a consistent experience across different TV brands. The launch of OpApp pr... More

IoT Security: Are Personal Devices Dragging Your Work Network Down? (Security Intelligence)

How many connected devices have you added to your household since March 2020? Be sure to count fitness trackers, speakers, gaming machines and even your Tesla, if there’s one in ... More

Code42 Incydr Product Protects Salesforce Customer, Pricing, Pipeline Data

Code42 launched a data exfiltration detector in the Code42 Incydr product that detects when reports are exported from an organization’s Salesforce instance to an untrusted destin... More

The Cost of a Data Breach Goes Beyond the Bottom Line (Security Intelligence)

How do you measure the cost of a company data breach? You could try asking those that have been attacked. The IBM Security Cost of a Data Breach Report 2021 did just that, and the ... More

Palo Alto Networks Unveils ML-Powered Cloud Security Platform (VentureBeat)

Palo Alto Networks unveiled a new cloud security offering, its Next-Generation CASB, which taps machine learning to bolster the protection of software-as-a-service and collaboratio... More

4 Skeletons to Keep Locked in Your Data Closet (archTIS Blog)

While every company may not have skeletons in their data closets that could discredit or embarrass them, there is a lot of sensitive data that every company needs to keep secret. H... More

Irdeto’s DRM Solution Issues Record-Breaking Amount of New Licenses

Irdeto announced the continuous strong growth of DRM licenses issued, with an incredible increase of 162% licenses issued in the last 15 months. The number of licenses has grown fr... More

IBM to Take on XDR With Buy of Endpoint Security Firm ReaQta (CRN)

ReaQta’s platform blocks abnormal behavior by defining threat behavior tailored to each business unit via deep learning done natively on the endpoint, IBM said.... More

AT&T Plants Palo Alto Networks’ Firewall Into Managed 5G Security (SDxCentral)

AT&T introduced a managed firewall service for 5G network deployments that combines the operator’s security services with Palo Alto Networks’ firewall.... More

A New Security Layer (Synamedia Blog)

Vulnerabilities of OTT Streaming Services and how to overcome them.... More

Jim Cramer Talks With Splunk’s CEO (The Street)

Splunk, which helps companies to both use their data and keep it safe, is seeing success in the cloud. Doug Merritt, president and CEO of Splunk, told Mad Money’s Jim Cramer on a... More

Security Design Best Practices Mean Trust and Certification (Arm Blueprint)

Third-party certification can aid device makers in ensuring a consistent standard of security is designed into the hardware and firmware of all devices, and the Arm ecosystem has a... More

Sign up for our newsletters
* indicates required
MESA Newsletters