Cyber Security

 

Six Ways to Get Your Employees on Board With Cybersecurity (Forbes)

Modern business leaders understand how important cybersecurity is. With data breaches happening on a near-constant basis, it’s absolutely essential that teams are working togethe... More

Protecting the Value Chain (NAGRA Blog)

Traditionally, content protection focused on conditional access, DRM and mDRM. This placed the emphasis on protecting the content rather than the end-to-end service. Equally, as o... More

Spotify Pays Hackers $120K to Help Maintain a Secure Service (Fortune)

Spotify has 232M active monthly users, more than 50 million music tracks and 450,000 podcast titles. Oh yes, and a "Priority 0" policy when it comes to security which has seen $120... More

Why Predictable Cybersecurity Practices are Less Secure (DXC Technology Blog)

New security threats are constantly evolving. It is impossible to build a system that is immune to all current and future threats, but it is crucial for organizations to assess vul... More

Akamai: Fortnite Ransomware Scams Should Force Developers, Gamers to Think About Security (VentureBeat)

Akamai noted that there is a big rise in credential stuffing attacks, where criminals use stolen identities in automated attacks that use brute force to break into accounts. From N... More

Detecting Malicious Traffic With Machine Learning (Verizon Media Platform)

Machine learning offers a unique opportunity to automate security research and stay ahead of application security threats. We share our research here into applying neural networks ... More

Why are Businesses Exploring a Zero-Trust Cybersecurity Strategy? (TechWire Asia)

The approach essentially directs security teams to demand authentication for each application, from users both internal and external to the organization. In contrast, the model mos... More

Can STEM Qualifications Hold the Key to the Future of Cybersecurity? (Forbes)

Cybersecurity is a specialized industry, employing people with skills built on a STEM foundation. Put these factors together, and it’s a job market where demand far outstrips sup... More

Demand for Cyber Insurance is High, and so are the Risks (Decipher)

Organizations already have a long list of insurance policies—for automotive accidents, healthcare, natural disasters, fire and water damage—and adding a policy to cover securit... More

Ignore These 3 Cybersecurity Risks at Your Own Peril (TNW)

3 missing pieces in your all-encompassing cybersecurity strategy.... More

DXC Technology Earns Cyber Resiliency Services Nod in New Report (CDSA)

End-to-end IT services firm DXC Technology has been named a leader in the cyber resiliency services according to the most recent Evaluation & Assessment Tool (NEAT) report from glo... More

How to Know if Your Cybersecurity Tools are Actually Working (Security Intelligence)

Next year’s security spend will likely increase. How should you proceed with additional investment when there’s so much uncertainty about the effectiveness of previous investme... More

Is Blockchain the Next Big Thing for Cybersecurity? (Avanade Insights)

Originally created to power the cryptocurrency Bitcoin, blockchain is a decentralized ledger that records all the transactions that are ever conducted within a peer-to-peer network... More

Mobile Identity is the New Security Perimeter (Forbes)

Mobile devices reflect you and your customers’ identity in the many apps, data, and ongoing activities you and they choose to engage in. Every enterprise looking to reinvent itse... More

The Impact of Artificial Intelligence on Cybersecurity (CPO)

There is currently a big debate raging about whether Artificial Intelligence is a good or bad thing in terms of its impact on human life. With more and more enterprises using AI fo... More

Email Crime Now Top Cause for Cyber Insurance Claims (ITProPortal)

Companies are filing for more cyber-insurance claims than ever before as the number of threats targeting businesses continues to rise. According to a new report, claims related to ... More

Cyberchology: Psychometric Tests are a Key Weapon in Battle Against Cybersecurity Breaches (IA)

Cyberchology: Could psychometric tests lessen vulnerability to cybersecurity breaches? New research reveals different personality types have different susceptibilities to cybercrim... More

Protecting Smart Cities (TechNative)

The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More

4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)

Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More

Survey’s Surprise Finding: Only Half of Organizations Believe They Can Stop Cyberattacks (DXC Technology Blog)

If they are being honest with you, any CISO will tell you that they are well aware of the fact that their organization can be breached. None, at least none that I know, would conte... More

Sign up for our newsletters
* indicates required
MESA Newsletters