Cyber Security

 

Ransomware Attacks Show Little Sign of Slowing in 2021 (Dark Reading)

Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks.... More

Cybersecurity Strategy: Building Trust on Shifting Sands (Security Intelligence)

Transforming the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a cybersecurity strategy. Like wal... More

What CIOs Need to Know About 5G Cybersecurity (Tech HQ)

As the transition towards 5G looms, get prepared for a host of new cyberthreats.... More

The Pressures the Online Gaming Community Faces When it Comes to Cybersecurity (SM)

Online games and specifically the Massive Multi-Player games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platf... More

Modernizing Your Security Operations Center for the Cloud (Security Intelligence)

Several factors are converging to exert pressure on how security operations centers (SOCs) traditionally function. Evolving information technology (IT) infrastructure, such as clou... More

Work From Home: Rethinking Security for a Boundaryless World (Avanade Insights)

The reality is that even before the coronavirus pandemic sent millions of employees to the home office, our personal digital ecosystems were already fraught with risk and complexit... More

State of Cybersecurity 2020: Changes, Challenges for WFH Culture (Richie May Blog)

As we have continued to stress in our most recent articles, many aspects of how businesses operate have changed over the past year, especially as a result of COVID-19. One thing th... More

Cybersecurity Awareness: A Key Lever in Cyber Defense (Forbes)

Organizations are increasingly adopting intelligence-driven cyber defense strategies. The costs and complexities involved in waging cyberattacks are significantly lower when compar... More

IBM Advances Cloud Pak for Security to Manage Threats Across Tools, Teams, Clouds

IBM announced new and upcoming capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect, respond to and protect... More

Can We Take Business Lessons From Cybercriminals? (Tech HQ)

While we defend our businesses like islands, information sharing is giving cyber attackers the upper hand. ... More

Cybersecurity and Your Passwords (Forbes)

What's something that stands between you and a cybercriminal that's in your full control? Your password. The world of password security is a tricky one because many of the best pra... More

Cybercrime is Now a Global Worry (IT Pro Portal)

Pretty much anyone that uses the internet worries about cybercrime.... More

How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start (Security Intelligence)

A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations a... More

3 Ways to Tighten Security and Get Ready for the New Normal (Avanade Insights)

Imagine if cybercriminals had a shred of decency. If they did, they wouldn’t take advantage of a global pandemic that has so far cost more than 400,000 lives. Unfortunately, that... More

Data Governance in the 21st-Century Organization (MIT Sloan)

Good governance requires balance and adjustment. When done well, it can fuel digital innovation without compromising security.... More

Cybersecurity Today: The Intersection of Technology and Behavior (Security Intelligence)

Wireless LAN, Bluetooth connectivity or mobile data transfer (which will explode with the wider deployment of 5G) are ubiquitous today. So what does this mean to the everyday perso... More

Why Do Hackers Hack? Perhaps Not for the Reasons You Think (Tech HQ)

When we think about the cyberattacks taking place minute by minute, day by day, we may assume financial motivations are key — but that's not always the case.... More

Cybersecurity Awareness Month is Here (WeLiveSecurity)

This year’s overarching theme of CSAM in the US is “Do Your Part. #BeCyberSmart.” The key message “If you connect it, protect it” focuses on the increasing inter-connecte... More

10 Security Pitfalls to Avoid in 2020 (Avanade Insights)

Cybersecurity is taking on a whole new level of urgency. With a huge percentage of employees shifting to remote working, managing this new world of work securely is proving extreme... More

Does the Future of Cybersecurity Lie in Tools or Talent? (Tech HQ)

Many believe that outsourcing cybersecurity or procuring the right technology can help overcome cybersecurity skill shortages, stress and burnout. The key remains to equip your IT ... More

Sign up for our newsletters
* indicates required
MESA Newsletters