Research

 

The Risk Maturity Journey (Richie May Blog)

To enable the maturity of your risk and compliance program and enable your framework to scale with your organization’s growth, you need appropriate buy in and direction from the ... More

Machine Learning in 2022: Data Threats and Backdoors? (Dark Reading)

While research illustrates some sly threats, experts say attackers will likely focus on data exposure and finding ways to fool algorithms.... More

Securing Media Content Using Watermarking at the Edge (AWS Media Blog)

Using forensic watermarking techniques, you can quickly identify and prevent media piracy. Since the edge is where all consumer streaming sessions are delivered from, it is the mos... More

New Global Irdeto Survey Reveals Game Developers’ Security Concerns

New research conducted by Irdeto in collaboration with Omdia found that 84% of game developers are continuously concerned about tampering and piracy. In-game cheating is a concern ... More

How Bridge Core Uses Bluescape for Secure Visual Collaboration

In 2015, Bridge Core partnered with Bluescape to enable government leaders to share and collaborate on information and rapidly make decisions in a digital environment. Bluescape en... More

5 Things New With Bug Bounty Programs (SI)

The average application today uses 528 open-source components, providing malicious actors with plenty of vectors by which they can compromise software on which potentially thousand... More

Splunk: Top 5 Data Security Predictions 2022 (Forbes)

Security teams have always had a very difficult job protecting their networks and data against a seemingly endless variety of unseen foes, from high-school hackers to international... More

MovieLabs Publishes Recommended Security Practices for the Use of Cloud Services for Production

MovieLabs has published the first version of the Enhanced Content Protection for Production (ECPP), providing a set of best practices for production services vendors, cloud service... More

Hyperledger Fabric Security Monitoring With Splunk

Blockchain infrastructure incorporates a diverse set of technologies, across a distributed network, which means it faces some unique challenges.... More

Trust is becoming a CISO Priority, Boosts Customer Stickiness (CD)

The trust relationship has taken on an unprecedented level of importance inside modern companies as the COVID-19 pandemic and the current political climate has opened a dystopian d... More

The Tide is Turning Against Ransomware but the Fight is Not Over Yet (Tech Monitor)

International co-operation between law enforcement agencies has led to arrests and shutdowns. But ransomware won't be eradicated without the help of 'safe haven' countries. ... More

What’s Next for Security Operation Centers? (CPO)

The Security Operation Centre (SOC) is the nerve system of an organisation’s security defences. Back in the days, the SOC focused mainly on fulfilling and assessing regulatory co... More

How Cyber Threat Intelligence Can Help to Protect Against Cloud Security Threats (TripWire)

The rapid increase in cloud computing services has made organizations face novel security challenges. The most alarming fact is that 43% of organizations have reported cases of 10 ... More

3 Risk Management Priorities CIOs are Focused on Right Now (Tech Republic)

CIOs have had their hands full since the start of the pandemic with three risk management and governance priorities weighing heavily on their minds.... More

Avoid Paying Ransoms – Instead, Focus on Situational Awareness (CD)

In the event of a ransomware attack, CISOs need pause amid chaos and gain a better understand around steps to recovery.... More

The CISO and the C-Suite: How to Achieve Better Working Relations (Security Intelligence)

As the workforce moved from the cubicle desk to the dining room table in 2020, cybersecurity suddenly became everyone’s concern. Focus turned to the chief information security of... More

DDoS Attacks are Becoming More Prolific and More Powerful (ZDNet)

A report warns about a rise in DDoS attacks as cyber criminals get more creative with ways to make campaigns more disruptive.... More

Code42 Incydr Now Detects Risky Data Movement to Unmonitored Devices – Like Personal Phones, Laptops

By identifying when a file moves to an unmonitored device, Incydr alerts security teams to blindspots, with the critical context – what type of information is being exposed, from... More

CISO Churn – Why it’s Happening and How to Stop It (Racontuer)

Only a quarter of chief information security officers (CISOs) last a year in the role. We look at the reasons behind this high turnover and ask what can be done to prevent it?... More

Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Decipher)

For as long as there have been computers, there have been bugs. That’s damn near 100 years and an uncountable number of bugs. If they were discovered at all, most of those bugs w... More

Sign up for our newsletters
* indicates required
MESA Newsletters