Cyber Security

 

The Rise of Machine Learning to Manage Dark Data (TechNative)

For years we have been wasting time and resources pushing aside the benefits of dark data, unconsciously dismissing the great potential it can offer a business or industry.... More

Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management (Security Intelligence)

Cybersecurity risk management is not a purely technical or theoretical endeavor. Information security investments now inform security supply with the aim of reducing data breaches ... More

NAGRA, Openview Extend Content Protection Partnership (CDSA)

Content protection and multiscreen TV solutions firm NAGRA has extended its content protection partnership with South African satellite TV service provider Openview, with NAGRA Pro... More

Cybersecurity: Under Half of Organizations are Fully Prepared to Deal with Cyberattacks (ZDNet)

Only 49% of CISOs and other senior executives are fully confident that their organization could deal with the fallout of a hacking incident or data breach right now, and most think... More

Check the Most Desirable Entry-Level Cybersecurity Skills (Thrive)

Looking for a job in cyber security? Good thinking. According to the U.S. Bureau of Labor Statistics, the job market for information security analysts is growing by 32 percent from... More

How Much Cybersecurity Funding is Enough – Is it a Bottomless Pit? (CIO)

No matter how much you spend on cybersecurity, there’s no guarantee you won’t have a significant incident. How do senior management and the board know what makes sense?... More

Why Hackers Will Always Win, and What You Can Do So They Don’t (TWA)

The stereotypical image of a hacker is that of a lone hooded figure at a computer, attempting to gain access — we presume — to a high-security network, probably belonging to a ... More

How Digital Agencies Can Prepare for Upcoming Cybersecurity Threats (Forbes)

Cybersecurity threats are a serious source of headache for organizations everywhere. Businesses, small and big, as well as government entities are all potential targets. Recognizin... More

8 Tips for More Secure Mobile Computing (Dark Reading)

Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.... More

Women in Cybersecurity: Where We Are and Where We’re Going (Scientific American)

Meg Whitman, Ginni Rometty, Marissa Mayer and Safra Catz are among the few women who have broken the glass ceiling as CEOs of technology companies. However, while women make up hal... More

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget (Security Intelligence)

The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breac... More

Why a Bug Bounty Could be Your Best Investment (Tech HQ)

Fines, lawsuits, downtime — security breaches can cost hundreds of millions. A bug bounty can cost just thousands.... More

Illumio, Akamai Spotlighted in Zero Trust Platform Report (CDSA)

Illumio and Akamai were both recognized as leaders by Forrester Research in The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers report. The report evaluated 14 ven... More

Why Security Segmentation Helps the Enterprise Keep Safe, and Keep Saving (TWA)

For large enterprises, many of which are household names, Illumio‘s Adaptive Security Platform provides the type of security segmentation that security, compliance and infrastruc... More

Poor Cyber Resilience: An Organization’s Achilles’ Heel (CIO)

Digital advances are recreating global business through ongoing advances in artificial intelligence, the Internet of Things (IoT), data availability, blockchain, and other key area... More

Cyberattacks: Are Small Businesses as Vulnerable as Large Enterprises? (TWA)

Small business owners are often under the illusion that they’re not as vulnerable as large enterprises when it comes to cyberattacks. As a result, the measures they take to secur... More

High Praise for TPN at vETC Event

Bryan Ellenburg, director of content security for CBS, CBS Films and Showtime, has seen a lot of security initiatives over the years, helping to hold down the content security fort... More

3 Key Questions to Help Address Enterprise IoT Security Risks (Security Intelligence)

Organizations across all industries are looking to the internet of things to improve efficiency, better understand customers to deliver truly memorable and competitive experiences,... More

Is Cryptocurrency the New Target for Cyber Criminals? (ReadWrite)

Disruption is happening everywhere! It is the new world mantra. Everyone is thinking about new things, innovation as we come to know it. We are in an age where new technologies are... More

Cyber Judgment: A New Path Forward for Decision Makers (IW)

According to the 2019 Gartner CEO Survey, 82% of CEOs have digital transformation programs in flight, a 20% jump from 2018. Value propositions, operations, customer strategies, and... More

Sign up for our newsletters
* indicates required
MESA Newsletters