Cyber Security

 

Why Just About Any Cybersecurity Incident Gives Nightmares to CXOs (TechWire Asia)

Major cybersecurity incidents give nightmares to CXOs, irrespective of who was attacked — and for good reason. When a cyberattack is successful, organizations lose credentials to... More

Implementing Privacy on Social Media (Forbes)

October is National Cyber Security Awareness month or NCSAM. During NCSAM, cybersecurity professionals share their insight with laypeople in addition to business. This insight help... More

Clever New DDoS Attack Gets a Lot of Bang for a Hacker’s Buck (Wired)

One of the trickiest things about stopping DDoS attacks is that hackers develop new variations on familiar themes. Researchers from Akamai's DDoS mitigation service Prolexic detail... More

Hammerspace Data-as-a-Service Protects, Secures Data Across the Hybrid Multi-Cloud (CDSA)

Hammerspace announced enterprise hybrid cloud services for protecting and securing data. Hammerspace, using its Data-as-a-Service platform, abstracts complex and diverse infrastruc... More

The Three Key Principles of a Digital Security Strategy (DXC Technology Blog)

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to del... More

What is Unified Threat Management? A Pragmatic Approach to Information Security (Security Intelligence)

Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will see a rise in everything from cryptojacking ... More

NAGRA’S Ivan Verbesselt Talks Scalable Service Protection for Pay TV Operators (Digital TV Europe)

"In a world where the demand for high-quality content – delivered anytime, anywhere, and on any device – is higher than ever, service providers increasingly have their work cut... More

Three Reasons Why Killing Passwords Improves Your Cloud Security (Forbes)

Because they’re porous, proliferating and turning into primary forms of digital IDs, mobile devices and their passwords are a favorite onramp for hackers wanting access to compan... More

Cyberattacks Now No. 1 Risk for Many Organizations (ITProPortal)

For businesses of all shapes and sizes, cyberattacks are now their biggest worry, according to a new report by insurance consultancy Marsh and Microsoft. The two companies polled m... More

City of Los Angeles Gets an IBM Security Cybercrime Boost (CDSA)

The city of Los Angeles and its L.A. Cyber Lab have tapped IBM Security for a new program geared toward helping local businesses collaborate to tackle cybercrime, and launch new, c... More

DNS Protection: A Must in Security Solutions for Any Company (Akamai Blog)

Domain name system (DNS) services are often a point of vulnerability for businesses, so DNS security has become a growing concern for many of them.... More

Is Your Enterprise Vulnerable to ‘Deepfake’ Technology? (DXC Technology Blog)

Deepfake audio is even easier than deepfake video (not that any deepfakes are easy; they do require some skills, time, and expense on the part of the creators). If the target is a ... More

Your Users Aren’t the Weakest Link – They’re Integral to Your Security Program (Security Intelligence)

As data breaches increase globally in both severity and frequency, business leaders are realizing that achieving better security outcomes requires a significant shift in the tradit... More

Cyberattackers Now Pose as Business Executives to Secure Security Certificates (ZDNet)

Security certificates are intended to elicit trust in users for the deployment of software, but as with so many other safeguards, threat actors can find a way to abuse the mechanis... More

How Cybersecurity Leaders Can Best Navigate the C-Suite (CPO)

While leaders acknowledge security is a vital part of their organization, they often prioritize other initiatives that provide a more direct return on investment. According to a re... More

Six Ways to Get Your Employees on Board With Cybersecurity (Forbes)

Modern business leaders understand how important cybersecurity is. With data breaches happening on a near-constant basis, it’s absolutely essential that teams are working togethe... More

Protecting the Value Chain (NAGRA Blog)

Traditionally, content protection focused on conditional access, DRM and mDRM. This placed the emphasis on protecting the content rather than the end-to-end service. Equally, as o... More

Spotify Pays Hackers $120K to Help Maintain a Secure Service (Fortune)

Spotify has 232M active monthly users, more than 50 million music tracks and 450,000 podcast titles. Oh yes, and a "Priority 0" policy when it comes to security which has seen $120... More

Why Predictable Cybersecurity Practices are Less Secure (DXC Technology Blog)

New security threats are constantly evolving. It is impossible to build a system that is immune to all current and future threats, but it is crucial for organizations to assess vul... More

Akamai: Fortnite Ransomware Scams Should Force Developers, Gamers to Think About Security (VentureBeat)

Akamai noted that there is a big rise in credential stuffing attacks, where criminals use stolen identities in automated attacks that use brute force to break into accounts. From N... More

Sign up for our newsletters
* indicates required
MESA Newsletters