Research

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current (Security Intelligence)

The greatest threats to the enterprise are often those that use social engineering to extract information or data from employees. For threat actors, this tactic rarely requires any... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

Predicting the Future of Next-Gen Access and Zero Trust Security in 2019 (Forbes)

The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security strategy based on Next-Gen Access that scales to protect every access po... More

Machine Learning Will Transform How We Detect Software Vulnerabilities (Security Intelligence)

No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when. While the literature generally focuses on the d... More

How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

Big Data is Causing a Surge of Data Breaches – Here are Some Solutions (SDC)

Data breaches can happen at multiple levels. Among a recent surge of data breaches, the ones with the greatest publicity are usually those affecting prominent websites or online se... More

How AI Can Help Stop Cyberattacks (WSJ)

As corporations struggle to fight off hackers and contain data breaches, some are looking to artificial intelligence for a solution. They’re using machine learning to sort throug... More

Crowdsourcing the Hunt for Software Bugs is a Booming Business – and a Risky One (MIT Tech Review)

More and more large companies like GM, Microsoft, and Starbucks, are now running “bug bounty” programs that offer monetary rewards to those who spot and report bugs in their so... More

Fraud a Growing Problem for Music Streaming (Variety)

Twitter’s recent housecleaning of some 70 million fake and automated accounts illuminates just how pervasive audience manipulation has become in the digital era. For Twitter, the... More

NSS Labs Honored for Achievement in Innovation (CDSA)

NSS Labs has been selected as a winner of the 2018 Red Herring Top 100 North America award, which recognizes innovative private technology companies in the region. This is the seco... More

What Comes After Passwords? (WSJ)

What will life after passwords look like? For many companies, the goal is for the authentication of customer and employee identities to be nearly invisible, taking only a second as... More

HITS Spring: IBM Security Lead Stresses Preparedness

Recently, Doug Lhotka, executive cybersecurity architect for IBM Security, sat down for a meal with a dozen CISOs, and picked their brains about what the biggest threat to their or... More

Salesforce Names Finch As Its Data Protection Officer (MediaPost)

Salesforce has named Lindsey Finch as its data protection officer in preparation for the arrival of the General Digital Protection Regulation on May 25. She already holds the title... More

Cyber Insurance Can Reshape the Way Organizations Do Security for the Better (IA)

The cyber landscape in 2018 is a chaotic and dangerous place. From state-sponsored hackers to financially motivated cybercrime gangs and negligent data loss, risk is everywhere and... More

AI for Fraud Detection: Beyond the Hype (SAS Blog)

The financial services industry has witnessed considerable hype around artificial intelligence (AI) in recent months. We’re all seeing a slew of articles in the media, at confere... More

Spotify Buys ‘Cover Song’ Licensing Firm to Tackle Copyright Risks (Reuters)

Spotify has acquired Loudr.fm, a San Francisco-based provider of licensing technology to help it to locate songwriters and pay them royalties they are due. The acquisition helps ad... More

NSS Labs Initiates Group Test Coverage of the Endpoint Detection, Response Market (CDSA)

NSS Labs today announced that it is expanding on its strong foundation of point-in-time testing and continuous security validation with the introduction of the Endpoint Detection a... More

Blockchain Roadblocks Hinder Content Protection (IW)

Blockchain platforms promise to help content providers solve thorny digital copyright ownership issues, but whether the technology can ever live up to its potential remains to be s... More