Cyber Security

 

Build a Roadmap for Cyber Resilience (Security Intelligence)

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization R... More

Jailbreaking is Killing Your App Security (Irdeto Persepctive)

Software and data transformation to make reverse engineering difficult remains important, but in a war against hackers and competitors, a single line of protection is not enough �... More

Top 5 Reasons Phishing Attacks Haven’t Dried Up (Akamai Blog)

Phishing is still the attack beachhead for many of the cyberattacks we read about week in, week out. 20 years on from AOL being hit by hackers, businesses are still struggling to a... More

6 Ransomware Trends You Should Watch for in 2020 (Security Intelligence)

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses ... More

Grupo Express Looks to NAGRA to Protect OTT Service (MESA)

Argentinian cable and broadband provider Grupo Express has tapped NAGRA and its multi-DRM technology to protect its new OTT service, NOW Express, on set-top boxes and portable devi... More

The Future’s Biggest Cybercrime Threat May Already Be Here (Dark Reading)

Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.... More

Paradigm Shift Left VPNs, Edge Security Awaiting Long-Term Strategy (CIO Dive)

Akamai was in the process of redesigning its office space into a more open concept, when COVID-19 eliminated the office environment entirely, said Maha Pula, VP of Solutions Engine... More

COVID-19 Has Disrupted Cybersecurity, Too (Agenda)

Businesses know they must rapidly innovate, take advantage of new digital tools and leverage cloud services to emerge from the crisis ahead of their competitors with momentum for t... More

AIOps and Cybersecurity – The Power of AI in the Backend (TechHQ)

Too often the power of AI and machine learning is enjoyed by the product user in the form of benefits to UX, and not necessarily by the product-makers, who may still be reliant on ... More

Email is Still a Hacker’s Wonderland (CIO Dive)

Half of hacked email accounts are compromised for less than 24 hours, according to a new report. The majority of attackers, 78%, stayed within email accounts, suggesting cloud-base... More

4 Steps to Help You Plan a Cyber Resilience Roadmap (Security Intelligence)

What is cyber resilience? According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, ... More

IBM: Compromised Employee Accounts Led to Most Expensive Data Breaches Over Past Year (CDSA)

IBM Security announced the results of a global study examining the financial impact of data breaches, revealing that these incidents cost companies studied $3.86 million per breach... More

Consumers Value Security Over Convenience in Post-COVID-19 World (CPO)

COVID-19 has made an identifiable impact on the way consumers are making payments. Some of these changes have been enforced by the physical and structural challenges of coping with... More

Pandemic Drove Criminal, Political Cyberattacks Across the Globe (IT Pro Portal)

Cybercriminals, state-sponsored hacking groups and political organizations used the Covid-19 pandemic to target rival organizations across various sectors, according to a new repor... More

Why Security Validation is Vital as Organizations Become More IoT Driven (SDC)

Because of the diversity of devices comprising the IoT, there’s no singular solution that can secure all of the devices used by organizations. Securing IoT and the rest of the ne... More

Schools Already Struggled With Cybersecurity – Then Came COVID-19 (Wired)

A lack of dedicated funding and resources made it hard to keep data secure—and that was before classes moved almost entirely online.... More

Cybersecurity for a Remote Workforce (MIT Sloan)

Organizations must act quickly to mitigate the cybersecurity risks created by a sudden shift to remote work.... More

Hackers Will Lurk in Your Email for More Than a Week After Breaking in (Tech Republic)

Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks. ... More

Malicious Coronavirus Domains Capitalize on Reopening Economies (Verdict)

Cybercriminals are known to adapt their scams to take advantage of the latest crisis and the Covid-19 coronavirus pandemic has been no different. Throughout the pandemic, criminals... More

Six Cyber Threats at Play During the Pandemic (Racontuer)

Opportunism is the bread and butter of cyber-attackers. Would-be malicious actors riff on the zeitgeist, exploiting predominant hopes, fears or uncertainties to breach defenses. An... More

Sign up for our newsletters
* indicates required
MESA Newsletters