Research

Putting Data Security at the Heart of Digital Transformation – From Culture to Code (Cloud Tech)

In the new digital economy, data is the most valuable asset a company possesses. However, according to a recent survey by IDC, the spending ceiling for data security is as low as s... More

Protecting Smart Cities (TechNative)

The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More

IBC 2019: MESA Members Bringing Storage, Cloud Tech

New cloud applications, top storage technologies and full platforms for media and entertainment companies will be on hand at IBC 2019 from members of the Media and Entertainment Se... More

Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More

Is AI Fundamental to the Future of Cybersecurity? (CSO)

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.... More

Google to Set Up a European Tech Hub to Deal With Data Privacy (CNBC)

Google will more than double its team of privacy experts in Germany as Europe looks to ramp up regulation of Big Tech and user data. CEO Sundar Pichai announced in a blog post on T... More

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current (Security Intelligence)

The greatest threats to the enterprise are often those that use social engineering to extract information or data from employees. For threat actors, this tactic rarely requires any... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

Predicting the Future of Next-Gen Access and Zero Trust Security in 2019 (Forbes)

The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security strategy based on Next-Gen Access that scales to protect every access po... More

Machine Learning Will Transform How We Detect Software Vulnerabilities (Security Intelligence)

No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when. While the literature generally focuses on the d... More

How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

Big Data is Causing a Surge of Data Breaches – Here are Some Solutions (SDC)

Data breaches can happen at multiple levels. Among a recent surge of data breaches, the ones with the greatest publicity are usually those affecting prominent websites or online se... More

How AI Can Help Stop Cyberattacks (WSJ)

As corporations struggle to fight off hackers and contain data breaches, some are looking to artificial intelligence for a solution. They’re using machine learning to sort throug... More

Crowdsourcing the Hunt for Software Bugs is a Booming Business – and a Risky One (MIT Tech Review)

More and more large companies like GM, Microsoft, and Starbucks, are now running “bug bounty” programs that offer monetary rewards to those who spot and report bugs in their so... More

Fraud a Growing Problem for Music Streaming (Variety)

Twitter’s recent housecleaning of some 70 million fake and automated accounts illuminates just how pervasive audience manipulation has become in the digital era. For Twitter, the... More

NSS Labs Honored for Achievement in Innovation (CDSA)

NSS Labs has been selected as a winner of the 2018 Red Herring Top 100 North America award, which recognizes innovative private technology companies in the region. This is the seco... More

What Comes After Passwords? (WSJ)

What will life after passwords look like? For many companies, the goal is for the authentication of customer and employee identities to be nearly invisible, taking only a second as... More

HITS Spring: IBM Security Lead Stresses Preparedness

Recently, Doug Lhotka, executive cybersecurity architect for IBM Security, sat down for a meal with a dozen CISOs, and picked their brains about what the biggest threat to their or... More