Security

 

Seven Tech Security Trends Heading Your Way Now (ZDNet)

The shift to cloud computing is creating an ever bigger threat surface -- but it's not the only change ahead.... More

Presidio and Palo Alto Networks Secure Hybrid Workforces With ZTNA 2.0

Up until 2020, digital transformation was among the long-term goals of many organizations. The global pandemic changed all that, compressing the timeframe for digital transformatio... More

Tata Play Turns to Irdeto and Broadpeak for Cybersecurity (DTE)

The platform has implemented Broadpeak BkS350 Origin Packager pre-integrated with Irdeto Control and Irdeto Media Manager to the OTT aggregation platform, Tata Play Binge. The plat... More

Security Leaders Chart New Post-CISO Career Paths (CSO)

The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.... More

Wasabi’s IT Hero Nate Returns to Warn About the Dangers of Ransomware

Wasabi launched a new security themed digital campaign, #ThinkBeforeYouClick, featuring IT Hero ‘Nate’ to warn about the dangers of ransomware. #ThinkBeforeYouClick marks the t... More

Why CFOs Must Take the Lead on Digital Executive Protection (Forbes)

Cybersecurity teams do heroic work protecting their organizations from cyberattacks. Although risks remain prevalent, they've made it infinitely more difficult for hackers to achie... More

FPT Software Achieves HITRUST Certification

The certification demonstrates that FPT Software’s systems have met key regulations and industry-defined requirements and are appropriately managing risks. (more…)... More

Palo Alto Networks Introduces the Autonomous Security Platform

Palo Alto Networks announced Cortex XSIAM: an AI-driven platform that can revolutionize the way data, analytics and automation are deployed by security organizations. Extended Secu... More

Palo Alto Networks Makes the Business Case for DevSecOps (SDxCentral)

Organizations can increase employee productivity and earn a better return on their security investments by shifting cloud security left at the infrastructure and application layer,... More

Privacy Certification is Playing a Larger and Larger Role in the IT Buying Process (ITProPortal)

Data privacy is now seen as a business imperative for almost all organisations, with knock-on effects on the IT buying process, new data suggests. According to the report, the vast... More

Vast Majority of Companies Will Increase Their Cybersecurity Budgets Again Next Year (ITProPortal)

Based on a poll of 302 IT security professionals, the report states that more than four in five (81 percent) will give their IT security budgets a boost in 2022. In almost a quarte... More

Data Security: Defending Against the Cache Poisoning Vulnerability (Security Intelligence)

Do you trust your cache? To meet the demands of the end-users and speed up content delivery, content caching by web servers and content delivery networks (CDN) has become a vital p... More

Code42 Incydr Product Protects Salesforce Customer, Pricing, Pipeline Data

Code42 launched a data exfiltration detector in the Code42 Incydr product that detects when reports are exported from an organization’s Salesforce instance to an untrusted destin... More

Code42, Splunk Partner to Enhance Detection and Response to Insider Threat Events

Code42 announced it is to deliver its data exfiltration alerts and dashboards within the Splunk Security Operations Suite. Security teams using the Code42 Insider Threat app for Sp... More

Shadow IT is Evolving as Businesses Sanction More Apps (CIO Dive)

Once solely the domain of super-users with enough technical acumen to surreptitiously set up and run infrastructure and apps, rogue IT now proliferates — and is accepted.... More

CIOs and CISOs – a Modern Power Struggle? (Raconteur)

With security threats a rising priority for businesses, some cyber chiefs want a bigger role, posing challenges for CIOs.... More

Splunk, DTEX Partner to Accelerate Zero-Trust Security Operations With Insider Risk Intelligence, Noise-Free Endpoint Telemetry

Splunk and DTEX Systems are accelerating security response times and root cause analysis, driving faster event resolution with advanced analytics and reporting, as well as decreasi... More

Code42 Incydr Now Detects Risky Data Movement to Unmonitored Devices – Like Personal Phones, Laptops

By identifying when a file moves to an unmonitored device, Incydr alerts security teams to blindspots, with the critical context – what type of information is being exposed, from... More

CISO Churn – Why it’s Happening and How to Stop It (Racontuer)

Only a quarter of chief information security officers (CISOs) last a year in the role. We look at the reasons behind this high turnover and ask what can be done to prevent it?... More

Hybrid Work Here to Stay: What Does That Mean for Security? (ZDNet)

A new survey from Palo Alto Networks shows the key challenges enterprises faced as they moved to remote work and they're doing next as hybrid work models gain more acceptance.... More

Sign up for our newsletters
* indicates required
MESA Newsletters