Cyber Security

 

Shifting From Ransomware Detection to Prevention (Security Intelligence)

Prevention is no easy feat, but some steps can be taken to reduce the risk of opportunistic attacks. In a recent study, 80 percent of cybersecurity decision-makers report that thei... More

Winning the Fight Against Deepfakes (Verdict)

As deepfake technology matures, driven by AI, big data and advances in digital manipulation of image and sound, a much more concerning use of the phenomenon is emerging. Deepfake t... More

Hacking and Cyber Espionage: The Countries That are Going to Emerge as Major Threats in the 2020s (ZDNet)

The continuing rise of state-backed hackers has been one of the most dramatic cybersecurity developments of recent years. And now it seems a new set of countries are keen to use th... More

How Password Reuse Puts Your Enterprise at Risk (CPO)

Not trying to sound hyperbolic here, but your customers’ password methods could mean the difference between saving or losing your business to the dark web.... More

As 5G Rolls Out, Troubling New Security Flaws Emerge (Wired)

It's not yet prime time for 5G networks, which still face logistical and technical hurdles, but they're increasingly coming online in major cities worldwide. Which is why it's espe... More

0% Unemployment Rate and 5 Other Numbers You Need to Know About Cybersecurity (CIO Dive)

Cybersecurity's success is measured by silence — no news to report, no breaches to clean up and no cyberattacks to recover from. Silence is achieved by the estimated 805,000 cybe... More

What are the Security Factors That Matter When Migrating to the Cloud? (TechWire Asia)

Cloud security needs thought, and neglecting the issue may result in the loss of data during or after the migration process because the move from on-premise to the cloud involves a... More

Cybercrime, Meet AI (TechNative)

One of the eternal truisms about cybersecurity is that it’s a cat and mouse game – and cybersecurity often seems to be behind the ball. Now, however, with artificial intelligen... More

Making the Case for Better Threat Intelligence (Thrive)

Huge sums of money have been invested in cyber security tools and operations, yet today’s security teams are still typically cash-strapped with limited resources. Budgets are mor... More

Cyber Crooks Take Aim at Their Next Big Target: eSports Tournaments, Players (ZDNet)

New research detail the ways in which the multi-billion dollar competitive online gaming industry could be vulnerable to malicious campaigns including DDoS attacks, malware and ext... More

Online Privacy Act Would Create Federal Privacy Agency (Decipher)

Two Silicon Valley legislators have introduced a new privacy bill in the House of Representatives that would create an independent privacy agency and place significant restrictions... More

ORock Technologies, Crunchy Data Partner on DBaaS Solution (MESA)

IT infrastructure and hybrid cloud solutions firm ORock Technologies has announced a new partnership with open-source PostgreSQL and enterprise PostgreSQL technology company Crunch... More

Security Pros Fear Insider Attacks Stem from Cloud Apps (Dark Reading)

More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.... More

INNOPIA Becomes First Korean ODM Partner of Netflix for Hailstorm Hybrid Program, Together With Synaptics, NAGRA (CDSA)

INNOPIA has been selected as the first Korean ODM partner of Netflix for Hailstorm Hybrid program based on Android TV Hybrid STB platform. At the Android TV Bangkok Summit event on... More

Data Intelligence Not as Security, but as Accountability (CPO)

The information economy has grown rapidly over the past decade—and for a while, with seemingly few controls. However, in recent years, organizations have been confronted with the... More

5 Tips to Keep Your Website Secure in 2020 (Entrepreneur)

Your business site is where all the magic happens, and if it's compromised, you could lose a lot. Here's how to make sure that doesn't happen.... More

The Rise of Machine Learning to Manage Dark Data (TechNative)

For years we have been wasting time and resources pushing aside the benefits of dark data, unconsciously dismissing the great potential it can offer a business or industry.... More

Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management (Security Intelligence)

Cybersecurity risk management is not a purely technical or theoretical endeavor. Information security investments now inform security supply with the aim of reducing data breaches ... More

NAGRA, Openview Extend Content Protection Partnership (CDSA)

Content protection and multiscreen TV solutions firm NAGRA has extended its content protection partnership with South African satellite TV service provider Openview, with NAGRA Pro... More

Cybersecurity: Under Half of Organizations are Fully Prepared to Deal with Cyberattacks (ZDNet)

Only 49% of CISOs and other senior executives are fully confident that their organization could deal with the fallout of a hacking incident or data breach right now, and most think... More

Sign up for our newsletters
* indicates required
MESA Newsletters