Cyber Security

 

Protecting Your Organization From the Inside Out: How to Combat Insider Threats (Forbes)

Attacks on organizations from external malicious actors seize headlines on a daily basis. These stories matter, because they’re an important reminder to both policymakers and bus... More

Anuvu Launches Cybersecurity Product in Renewed Partnership With Elcome

Under this agreement, the companies will continue serving maritime customers with connectivity and cyber security solutions that ensure crew welfare and compliance with the Interna... More

The Murky Cybersecurity Threat of Browser Extensions (Tech HQ)

Not every browser extension is safe – many maliciously open the user to a variety of issues including fraud and identity theft.... More

Your Home Away From Home May Not be as Cybersecure as You Think (Security Intelligence)

Home is where the ‘smart’ is. A recent study revealed the average American household has 25 connected or Internet of Things (IoT) devices. The number of consumers who have smar... More

Updated Joker Malware Floods Into Android Apps (Threat Post)

The Joker mobile trojan is back on Google Play, with an uptick in malicious Android applications that hide the billing-fraud malware, researchers said. It’s also using new approa... More

Ransomware is a Worldwide Problem: Palo Alto Networks (Bloomberg)

Palo Alto Networks Senior Vice President Wendi Whitmore discusses the new business model behind ransomware attacks and how it's disrupting supply chains.... More

Multi-DRM Best Practices for Live Sports Streaming, Other Live Events (The DRM Blog)

Live sports streaming is a rapidly growing industry that will continue to grow as the world continues to become more digitally connected and as people migrate from cable TV package... More

Amateur Critical Infrastructure Attacks Growing in Frequency, Relative Severity (SI)

Low-sophistication operational technology (OT) attacks grew in frequency and relative severity over the previous few years, according to Mandiant. In doing so, they broadened the t... More

Cybersecurity Skills Remain in High Demand but Pay is Stagnating (Tech Monitor)

Despite the pandemic putting cyber threats at the core of businesses' worries, a focus on front-office roles means many security professionals have not seen salary increases.... More

Irdeto, confinis to Launch the First Cybersecurity Assessment Tool in the Medical Devices Industry

Irdeto and confinis will provide medical device companies a comprehensive toolkit to determine the regulatory readiness of their medical devices. (more…)... More

Addressing the Cybersecurity Skills Gap Through Neurodiversity (TechCrunch)

Addressing the skills gap and strengthening your own security team means bringing in different minds and perspectives — and that starts with embracing neurodiversity. To even hav... More

As Cryptocurrencies Surge, so Do the Scams (Racontuer)

Investment scams involving digital assets like bitcoin have skyrocketed in recent months. However, authorities are striking back with some success.... More

Thoughts on What to Do to be More Resilient to Ransomware (Edgescan Blog)

There is no silver bullet but here are some tips that may reduce the risk and impact if you’re unfortunate enough to be faced with a breach.... More

Why Hackers Like Your Remote Access (Palo Alto Networks Blog)

Cybersecurity is a constant game of cat and mouse, with attackers and defenders locked in a perpetual race for finding, exploiting and patching vulnerabilities. With most of the wo... More

Splunk Named Market Share Leader in ITOM, SIEM Reports

While the worst of COVID-19 will hopefully soon be behind us, the need to continuously transform our digital environment is unequivocally here to stay. ... More

Amazon Launches AWS BugBust (AIM)

The AWS BugBust Challenge is a global competition for developers to remove one million software bugs. Developers can join the challenge by creating an AWS BugBust event for their o... More

Are Businesses Underinvesting in Cybersecurity? (Cybersecurity Dive)

The issue isn't how large of a cybersecurity investment an organization makes, but rather, if it is spending funds properly.... More

Have We Reached Peak Ransomware? (ZDNet)

A string of high-profile cyberattacks has made ransomware an impossible issue to ignore - in fact, even world leaders are talking about it. Will this be enough to make cyber crimin... More

Cybersecurity Certifications: Take Your Career to the Next Level (Security Intelligence)

With 3.1 million unfilled cybersecurity roles last year, companies are struggling to find qualified talent. After having written numerous articles on the IT skills gap, I’ve seen... More

Manufacturers are in the Crosshairs of Cybercriminals (INTRUSION Blog)

Researchers identified that the top vulnerabilities were information leakage, insufficient session expiration, cross-site scripting, insufficient transport layer protection, and co... More

Sign up for our newsletters
* indicates required
MESA Newsletters