Research

 

Denuvo by Irdeto Launches New Solution to Protect Downloadable Content Against Piracy

Denuvo by Irdeto announced the launch of pioneering technology to protect downloadable content against piracy. Denuvo SecureDLC is the first of its kind in the gaming market and pr... More

Ransomware is the Biggest Global Cyber Threat (ZDNet)

Ransomware is the biggest cybersecurity threat facing the world today, with the potential to significantly affect whole societies and economies – and the attacks are unrelenting,... More

Ransomware Groups Shift Tactics and Objectives (Cybersecurity Dive)

Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.... More

Checklist for Selecting a Vulnerability Management Solution (Edgescan Blog)

In 2022, there have been leaps and bounds made with more robust and complete Vulnerability Management solutions. The Global 3000 Enterprise now has the luxury to expect the solutio... More

Data Reform Bill Proposes GDPR Changes (RL)

The government has published a data reform bill to change the UK’s data laws post-Brexit. As part of the UK reforms, the bill will seek to cut down on the number of ‘user conse... More

To Retain Cybersecurity Employees, Know What Drives Them (Security Intelligence)

It’s hard to know for sure, but based on a recent survey, it appears that 2020 and 2021 were a ‘blip’ on the satisfaction meter, with downward trends back again. Today, pande... More

How Do Meltdown and Spectre Haunt Anti-Cheat? (Irdeto Blog)

One of the tactics widely used by cheaters in multiplayer games is modifying the software loaded into memory by overwriting the original code of the process, or by injecting their ... More

An Emerging Threat: Attacking 5G Via Network Slices (Dark Reading)

A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.... More

Can the New National Cyber Strategy Make the UK a Security Leader? (Raconteur)

Are the UK’s latest plans to develop the country’s cyber capabilities sufficient to deal with the latest digital threats?... More

The Ransomware Dilemma (MIT)

The decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack.... More

SEO-Savvy Threat Actors Drive Surge in Malware Downloads (CD)

Cybercriminals are using simple but enduring techniques for search engine optimization to lure individuals to phishing scams and malware downloads, resulting in a sharp increase in... More

Ransomware is the Biggest Cybersecurity Pain Point in India: IBM Security’s Chris Hockings (ET)

The biggest cybersecurity pain point in India relates to ransomware and IBM found that ransomware gangs would persist on average 17 months on a particular ransomware approach, befo... More

How CISOs are Walking the Executive Tightrope (IW)

The role of the chief information security officer is rapidly evolving, requiring a balanced mix of business acumen, communication skills, and risk management savvy.... More

How Specialist Insurance Can Mitigate Cyber Risk (Racontuer)

With cyber attacks on the rise, companies must ensure they have the right insurance policies and business practices in place to safeguard themselves.... More

The State of Data Security in 2022 (BigID Blog)

Data is an organization’s single most valuable asset, relied upon to make critical strategic and operational decisions every day. Much of this information is highly sensitive or ... More

Your Best Cyber Defense Against Ransomware and More? Understanding Your Enemy (Security Intelligence)

From calculators to cloud to quantum, computing has changed the lives of billions of people for the better. But just as innovation can be a force for good, it can also help cyber c... More

NFT Security Risks: Old Scams and New Tricks (Security Intelligence)

The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores incre... More

Developers Increasingly Prioritize Secure Coding (Dark Reading)

Software companies and development teams have a long way to go before secure coding becomes part of their culture, but there are signs that both programmers and their companies are... More

Low-Code is Easy, but is It Secure? (Security Intelligence)

Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and ... More

Is Anyone Doing Anything About the Explosion in Crypto Crime? (Security Intelligence)

As cryptocurrency transactions continue to grow, it’s no surprise that crypto crime has also seen a huge upswing. In 2021, illicit addresses raked in $14 billion, up nearly 80% c... More

Sign up for our newsletters
* indicates required
MESA Newsletters