Gartner Shrinks Infosec Spending Forecast for 2020, Cloud Security Gets COVID-19 Boost (CIO Dive)

Gartner expects spending on information security to increase just 2.4% this year, down from December projections of 8.7% growth, according to the firm's analysis. Spending is expec... More

Cyberhaven Honored for Data Protection Work (CDSA)

Cyberhaven was named a 2020 Fortress Cyber Security Award winner in the Data Protection category. The company also unveiled new continuous monitoring and real-time discovery capabi... More

Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)

With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More

Mobile Phishing Incidents are Growing, and Costing Companies Millions (Verdict)

Mobile phishing incidents targeting enterprises are on the rise, with the cost of single incidents potentially running into the hundreds of millions, according to new research.... More

Akamai CTO on How Bots are Used Online in Legal, Illegal Ways (Tech Republic)

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle. ... More

NAGRA NexGuard Forensic Watermarking Nabs Two Awards (CDSA)

NAGRA announced that its latest NexGuard forensic watermarking solutions won multiple top honors at the NAB Show Express Special Edition Best of Show Awards 2020, presented by Futu... More

Zero Trust for Maximum Security in a COVID World (Thrive)

While companies face myriad challenges during this time, it is critical that C-level executives keep security top of mind. The reason? COVID-19 has brought a dramatic change to the... More

The Evolution of Enterprise Security Systems, Best Practices by Alibaba (Alibaba Cloud Blog)

For Alibaba Cloud, which provides infrastructure products, the key risk domains for cloud computing businesses include hardware, systems, networks, and user compliance. The focus a... More

Business Continuity and Security in a Remote Work Era (Illumio Blog)

The unprecedented social distancing measures have created a unique and somewhat unexpected challenge for many IT and risk teams. Business Continuity Planning strategies often cente... More

COVID-19 Lockdown: What ISPs Should Learn About Parental Controls (Irdeto Perspective)

Screen use is rocketing all round, for kids and for adults who are often simultaneously being parent, teacher and home-office worker. Families can’t always be present to effectiv... More

Why It’s Make-or-Break Time for the World’s VPN Market (TWA)

The thousands of workers performing their duties remotely over the past few weeks are facing a barrage of cybersecurity risks. Enterprise security teams have been scrambling to ado... More

6 Micro-Segmentation Requirements for Modern Applications (Illumio Blog)

The idea of segmenting the network as a way to increase security is not a new one. But it has been difficult to achieve granular segmentation because compute and security have been... More

A CISO’s Perspective on Implementing a Safety Net for Data in Times of Crisis (Cyberhaven Blog)

Remote work poses more challenges and more risk for sensitive data. Employees are more likely to resort to shadow IT to share sensitive data, such as copying sensitive information ... More

Securing the New Remote Workforce (Illumio Blog)

Recent change means the workforce isn’t interacting with the IT estate in the same way it was a few months ago. The perimeter in 2020 includes personal devices, home routers, sma... More

Remote Working: The Security Questions Clients are Asking (Avanade Insights)

How to keep your data safe through to ensuring secure collaboration.... More

How ZOO Keeps Content Secure Through the Entire Dubbing Workflow (ZOO Digital Blog)

As a dubbing services provider for the biggest names in entertainment, we recognize that we’re dealing with some of the most sought-after TV and movie content around. But how do ... More

Cyberthreats to Gaming Companies and Gamers (Security Intelligence)

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies... More

Addressing Security Holes to Protect Valuable Content (NAGRA Blog)

In today’s M&E industry, to remain competitive, you must stay on your toes when it comes to innovation and evolution. From pay-TV operators to broadcasters and content owners, th... More

In 2020, IoT Security Must Be Part of Your Threat Management Strategy (Security Intelligence)

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or ... More

Gen Z Leading a New Wave of Internet Piracy (Motherboard)

Between Netflix, Hulu, and Disney+, it seemed like streaming giants might have finally won. Gen Z is proving that piracy will never die.... More