Google Cloud Platform Beefs Up With 30 Security Announcements (VentureBeat)

Throughout Google Cloud Next 2019, Google execs kept repeating one number: 30 security-related announcements. The message is clear: Google Cloud Platform is getting more secure. Th... More

3 Things You Need to Know about Securing a Blockchain (ISE Blog)

As leaders around the globe investigate how to leverage the benefits of blockchain technologies, security is often a primary concern. They may be aware of the many security benefit... More

Google Debuts Policy Intelligence, AI for Cloud Governance (VentureBeat)

Google Cloud today introduced Policy Intelligence in beta, a series of AI-powered features designed to suggest actions by administrators aimed at improving security for organizatio... More

NAGRA, MTM Launch the 2019 Pay-TV Innovation Forum (CDSA)

NAGRA and MTM have announced the launch of the 2019 Pay-TV Innovation Forum. The global research programme will explore the biggest challenges facing pay-TV service providers and c... More

Entertainment Partners Achieves ISO 27001 Certification (CDSA)

Entertainment Partners has announced that it is one of first entertainment firms to achieve certification for ISO 27001, an international standard for information security manageme... More

Cyberattack Traffic Climbed by a Third in 2018 (Verdict)

Cyberattack traffic increased significantly in 2018, according to new research, but companies are struggling to detect incidents. It is likely that this increase has also occurred ... More

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

How AI-Based Cheating Tools Have Forced Video Game Companies to Innovate Security (Analytics India)

While artificial intelligence has entered the mainstream in a big way and found applications in almost every walk of life, there is one field where it has been widely used for many... More

When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

Improving Cybersecurity Means Taking More Care with What We Digitize (HBR)

Security researcher Troy Hunt recently discovered one of the largest online troves of leaked personal information in history. Hunt’s discovery stresses a point that’s been evid... More

Why CISO’s Need to Appreciate the Full Identity Picture in 2019 (Avanade Insights)

Every now and then a new idea gains traction in my industry that demands a little more context. This is the case with a recent security report from Gartner, suggesting the number o... More

Email Security Does Not End With Your Password (We Live Security)

Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are availabl... More

Four Cybersecurity Priorities for Congress to Confront Active Threats (The Hill)

The 116th Congress may have difficulty finding common ground on most issues. But there is at least one area that presents the opportunity for bipartisan action: cybersecurity. Cybe... More

SAP’s Tom Padgett, Laura Grant: Agencies Should Pick Cloud Partners Committed to Security, Innovation (GovConWire)

Tom Padgett and Laura Grant of SAP have said agencies should partner with a cloud service provider with a capability to innovate and offer security. Grant and Padgett wrote about t... More

Embrace the Intelligence Cycle to Secure Your Business (Security Intelligence)

Regardless of where we work or what industry we’re in, we all have the same goal: to protect our most valuable assets. The only difference is in what we are trying to protect. Wh... More

Predicting the Future of Next-Gen Access and Zero Trust Security in 2019 (Forbes)

The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security strategy based on Next-Gen Access that scales to protect every access po... More

How Blockchain May Kill the Password (CW)

Blockchain technology is being piloted as the basis for self-sovereign identities, which can eliminate user names and passwords for logging into corporate sites or verify sensitive... More

6 Ways to Anger Attackers on Your Network (Dark Reading)

When you see an attacker on your network, it's understandable to want to give them a taste of their own medicine. But how can you effectively anger intruders when "hacking back" is... More

How Blockchain Is Making Waves In Media, Entertainment (Forbes)

Piracy. A blockchain platform cannot solve the privacy problem just by recording transactions, but it can mitigate piracy if the platform itself delivers the content so streaming t... More