Security

 

CISO Churn – Why it’s Happening and How to Stop It (Racontuer)

Only a quarter of chief information security officers (CISOs) last a year in the role. We look at the reasons behind this high turnover and ask what can be done to prevent it?... More

Hybrid Work Here to Stay: What Does That Mean for Security? (ZDNet)

A new survey from Palo Alto Networks shows the key challenges enterprises faced as they moved to remote work and they're doing next as hybrid work models gain more acceptance.... More

Microsoft Announces New Ransomware Detection Features for Azure (ZDNet)

Microsoft has unveiled a new ransomware detection feature for its Azure customers that will send alerts to security teams when the system observes actions "potentially associated w... More

Data Breach Costs at Record High, Zero Trust, AI, Automation Help Reduce Costs (Security Intelligence)

Remote working and digital transformation were rushed by necessity during the pandemic. With security lagging behind, that increased the cost of a data breach. Organizations that p... More

Orange Selects Prisma Cloud by Palo Alto Networks to Secure its Global Cloud Operations

Orange will use Prisma Cloud's Cloud Security Posture Management (CSPM) features for multi-cloud compliance and governance along with Prisma Cloud's Cloud Workload Protection (CWP)... More

Engineers Need Cybersecurity Training, Too (CIO Dive)

Companies will undergo a shift in cyber culture, eventually combining the data engineers and network security professionals use to search for vulnerabilities. https://www.ciodiv... More

Thriving in Chaos: How Cyber Resilience Works (Security Intelligence)

In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. https://securityintelligence.com/articles/chaos-how-cyber-resilie... More

IBM FlashSystem Gets Safeguarded Data Copies to Speed up Cyberattack Recovery (ZDNet)

Safeguarded Copy automatically creates data copies that are security isolated within the systems and cannot be accessed. In addition, IBM said it will launch its IBM Storage as a S... More

Cybersecurity Certifications: Take Your Career to the Next Level (Security Intelligence)

With 3.1 million unfilled cybersecurity roles last year, companies are struggling to find qualified talent. After having written numerous articles on the IT skills gap, I’ve seen... More

CISOs, CIOs See Heightened Mobile Security Threat Amid Shift to Hybrid (CIO Dive)

In a global shift to remote work, more than three-quarters of IT decision-makers said their organizations were more vulnerable to cyberattacks against mobile devices compared with ... More

The Art and Strategy of Becoming More Cyber Resilient (Security Intelligence)

Thinking only about tactics will always put you in a reactive position. So, you will always make short-term decisions based on a previous ad-hoc solution. These short-term tactics ... More

Average Time to Fix Critical Cybersecurity Vulnerabilities is 205 Days (ZDNet)

More than 66% of all applications used by the utility sector had at least one exploitable vulnerability open throughout the year, according to a new report.... More

AT&T Adds Palo Alto Networks to SASE Arsenal (SDxCentral)

The new service pairs Palo Alto Networks’ Prisma Access and Prisma SD-WAN into a single vendor SASE platform that’s fully managed by AT&T Cybersecurity. The service is the seco... More

How the Rise of the Remote SOC Changed the Industry (Security Intelligence)

What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working... More

Palo Alto Networks Leads Efforts to Combat Ransomware

Data from the Palo Alto Networks Unit 42 threat intelligence team demonstrates just how rapidly the cost of these attacks is growing: The average cyber ransom paid more than double... More

Arm’s Ongoing Efforts to Demystify Security (Blueprint)

The underlying mechanics of security breaches can be difficult to comprehend. Arm is taking steps to more clearly map the dangers and defenses – here’s how. ... More

When Regulations Don’t Apply, Data Security Use Cases Do (Security Intelligence)

The reason why organizations that aren’t heavily regulated dismiss regulations that don’t apply to them may seem obvious. Less regulation and less sensitive data mean less of a... More

Palo Alto Networks Leads Efforts to Combat Ransomware

Data from the Palo Alto Networks Unit 42 threat intelligence team demonstrates just how rapidly the cost of these attacks is growing: The average cyber ransom paid more than double... More

How IT Can Support Security in the Event of a Cyberattack (CIO Dive)

CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled.... More

CISO Budgets Strained as Cybercrooks Ramped Up Attacks During COVID-19 (Verdict)

A crucial part of a CISO’s role is making the business case for investing in cybersecurity to ensure organisations stay ahead of cybercriminals... More

Sign up for our newsletters
* indicates required
MESA Newsletters