Research

 

Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Decipher)

For as long as there have been computers, there have been bugs. That’s damn near 100 years and an uncountable number of bugs. If they were discovered at all, most of those bugs w... More

Convergent Risks Restarts On-Site TPN Security Assessments

Convergent Risks, a provider of security, risk and compliance services for the media and entertainment industry, has announced renewed availability of on-site Trusted Partner Netwo... More

Data Breach Costs at Record High, Zero Trust, AI, Automation Help Reduce Costs (Security Intelligence)

Remote working and digital transformation were rushed by necessity during the pandemic. With security lagging behind, that increased the cost of a data breach. Organizations that p... More

Top Reasons That Crash Livestreams (BuyDRM Blog)

Engineers are always looking for new and better ways to stream large events. Whether you're streaming a live event on Facebook or YouTube Live, or using your custom-built video str... More

A Quick Guide to Decentralized Identity and Its Benefits (Avanade Insights)

Although identity systems have improved, with the introduction of multiple factors for authentication, the fundamental issue of proving a stranger’s identity remains.... More

Attacks on Operational Technology From IBM X-Force, Dragos Data (Security Intelligence)

The research shows that ransomware and remote access Trojans are the most common attack types against enterprise networks connected to OT networks.... More

Splunk Named Market Share Leader in ITOM, SIEM Reports

While the worst of COVID-19 will hopefully soon be behind us, the need to continuously transform our digital environment is unequivocally here to stay. ... More

Cyber Insurance Isn’t Helping With Cybersecurity, and Might be Making the Ransomware Crisis Worse (ZDNet)

Allowing organizations to claim back ransom payments could be making the problem of ransomware worse - but cyber insurance could be used to help improve security, says new research... More

Manufacturers are in the Crosshairs of Cybercriminals (INTRUSION Blog)

Researchers identified that the top vulnerabilities were information leakage, insufficient session expiration, cross-site scripting, insufficient transport layer protection, and co... More

How the Rise of the Remote SOC Changed the Industry (Security Intelligence)

What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working... More

Why Cybersecurity Research is Now More Important Than Ever (TechRadar)

Cybersecurity is no longer the fringe discipline of IT that it might have been 30 years ago. It now touches every aspect of our lives, every single day. Some estimate that by 2025,... More

Cyberweek 2020 Attracted Both Online Shoppers, DDoS Attackers (Akamai Blog)

2020 has shown both record busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai. This holiday season is ripe with pent-up online shopping de... More

Meet the Hackers Who Earn Millions for Saving the Web, One Bug at a Time (ZDNet)

These hackers are finding security bugs – and getting paid for it. That's changing the dynamics of cybersecurity.... More

Why Cybersecurity, AI are Top Governance Risks for Board Directors, CEOs (Forbes)

Today bringing key business stakeholders across the enterprise with diverse skill sets ranging from: human resources, legal, business, technology, security - all with a unified mis... More

Email is Still a Hacker’s Wonderland (CIO Dive)

Half of hacked email accounts are compromised for less than 24 hours, according to a new report. The majority of attackers, 78%, stayed within email accounts, suggesting cloud-base... More

Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)

With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More

Securing the New Remote Workforce (Illumio Blog)

Recent change means the workforce isn’t interacting with the IT estate in the same way it was a few months ago. The perimeter in 2020 includes personal devices, home routers, sma... More

The Dark Web: Behind the Mystery and Preserving Privacy (Verdict)

The dark web is renowned for being the leading marketplace for all kinds of dirty deals, with stolen data being among the most coveted of purchases.... More

Addressing Security Holes to Protect Valuable Content (NAGRA Blog)

In today’s M&E industry, to remain competitive, you must stay on your toes when it comes to innovation and evolution. From pay-TV operators to broadcasters and content owners, th... More

Winning in the New Era of Digital Regulation (CPO)

The pace and complexity of regulatory requirements continues to grow globally, with no sign of slowing. For businesses, the challenges are not just that new regulations are being p... More

Sign up for our newsletters
* indicates required
MESA Newsletters