Cyber Security
Build a Roadmap for Cyber Resilience (Security Intelligence)
The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization R... More
Jailbreaking is Killing Your App Security (Irdeto Persepctive)
Software and data transformation to make reverse engineering difficult remains important, but in a war against hackers and competitors, a single line of protection is not enough �... More
Top 5 Reasons Phishing Attacks Haven’t Dried Up (Akamai Blog)
Phishing is still the attack beachhead for many of the cyberattacks we read about week in, week out. 20 years on from AOL being hit by hackers, businesses are still struggling to a... More
6 Ransomware Trends You Should Watch for in 2020 (Security Intelligence)
A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses ... More
Grupo Express Looks to NAGRA to Protect OTT Service (MESA)
Argentinian cable and broadband provider Grupo Express has tapped NAGRA and its multi-DRM technology to protect its new OTT service, NOW Express, on set-top boxes and portable devi... More
The Future’s Biggest Cybercrime Threat May Already Be Here (Dark Reading)
Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.... More
Paradigm Shift Left VPNs, Edge Security Awaiting Long-Term Strategy (CIO Dive)
Akamai was in the process of redesigning its office space into a more open concept, when COVID-19 eliminated the office environment entirely, said Maha Pula, VP of Solutions Engine... More
COVID-19 Has Disrupted Cybersecurity, Too (Agenda)
Businesses know they must rapidly innovate, take advantage of new digital tools and leverage cloud services to emerge from the crisis ahead of their competitors with momentum for t... More
AIOps and Cybersecurity – The Power of AI in the Backend (TechHQ)
Too often the power of AI and machine learning is enjoyed by the product user in the form of benefits to UX, and not necessarily by the product-makers, who may still be reliant on ... More
Email is Still a Hacker’s Wonderland (CIO Dive)
Half of hacked email accounts are compromised for less than 24 hours, according to a new report. The majority of attackers, 78%, stayed within email accounts, suggesting cloud-base... More
4 Steps to Help You Plan a Cyber Resilience Roadmap (Security Intelligence)
What is cyber resilience? According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, ... More
IBM: Compromised Employee Accounts Led to Most Expensive Data Breaches Over Past Year (CDSA)
IBM Security announced the results of a global study examining the financial impact of data breaches, revealing that these incidents cost companies studied $3.86 million per breach... More
Consumers Value Security Over Convenience in Post-COVID-19 World (CPO)
COVID-19 has made an identifiable impact on the way consumers are making payments. Some of these changes have been enforced by the physical and structural challenges of coping with... More
Pandemic Drove Criminal, Political Cyberattacks Across the Globe (IT Pro Portal)
Cybercriminals, state-sponsored hacking groups and political organizations used the Covid-19 pandemic to target rival organizations across various sectors, according to a new repor... More
Why Security Validation is Vital as Organizations Become More IoT Driven (SDC)
Because of the diversity of devices comprising the IoT, there’s no singular solution that can secure all of the devices used by organizations. Securing IoT and the rest of the ne... More
Schools Already Struggled With Cybersecurity – Then Came COVID-19 (Wired)
A lack of dedicated funding and resources made it hard to keep data secure—and that was before classes moved almost entirely online.... More
Cybersecurity for a Remote Workforce (MIT Sloan)
Organizations must act quickly to mitigate the cybersecurity risks created by a sudden shift to remote work.... More
Hackers Will Lurk in Your Email for More Than a Week After Breaking in (Tech Republic)
Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks. ... More
Malicious Coronavirus Domains Capitalize on Reopening Economies (Verdict)
Cybercriminals are known to adapt their scams to take advantage of the latest crisis and the Covid-19 coronavirus pandemic has been no different. Throughout the pandemic, criminals... More
Six Cyber Threats at Play During the Pandemic (Racontuer)
Opportunism is the bread and butter of cyber-attackers. Would-be malicious actors riff on the zeitgeist, exploiting predominant hopes, fears or uncertainties to breach defenses. An... More