Technology

 

Akamai Focused on ‘What’s Next’ Following New Traffic Milestone

Akamai hit a new milestone last week when web traffic delivered across the edge network peaked at 200 terabits per second (Tbps). To be blunt - that's a whole lot of data traveling... More

Threat Intelligence is Undergoing its Renaissance (ITProPortal)

With a rapidly changing cybersecurity environment, threat intelligence can lead the way to a more agile framework.... More

Size Does Not Mean Compromise – Mobile Game Protection is Affordable for All Studios (Irdeto Insights)

Game publishers and developers spend weeks, months and years working on new and exciting mobile games. They invest their time, hard work and creativity into their games. However, a... More

Palo Alto Networks, Alkira Partner to Drive Koch Industries Network Cloud Transformation

Palo Alto Networks announced today that Koch Industries has initially deployed the combined offering of Alkira's Cloud Services Exchange and Palo Alto Networks VM-Series Virtual Ne... More

Ransomware as a Service is the New Big Problem for Business (ZDNet)

Easy-to-use ransomware as a service schemes are booming, accounting for almost two-thirds of ransomware campaigns during the past year, warn researchers.... More

Can Audio-Only Social Networks Compromise Data Privacy? (TechHQ)

Clubhouse resembles a smartphone-based version of conferences but as it continues to expand, its security and privacy failings have come under increased scrutiny.... More

The Rise of ‘Shadow Code’ Leaves Websites Vulnerable to Data Breaches (Tech Monitor)

Using third-party code can aid swift digital transformation but, unless properly governed, it can open the door for security flaws.... More

Irdeto Wins Big at the Cybersecurity Excellence Awards 2021

Irdeto has won 20 awards at this year’s Cybersecurity Excellence Awards, highlighted by recognition as ‘Best Cybersecurity Company Europe’ as well as ‘Most Innovative Cyber... More

BuyDRM Secures Video Workflows in Google Cloud

BuyDRM’s KeyOS Technologies are focused on the media and entertainment verticals. (more…)... More

Irdeto Seals Partnership With KAON Broadband

KAON has successfully integrated Trusted Home agent into its latest DOCSIS 3.1 WiFi 6 broadband customer-premises equipment. (more…)... More

Creating a Fraud Risk Scoring Model Leveraging Data Pipelines, ML With Splunk

Organizations that undertake proactive data analysis techniques, experience frauds that are up to 54% less costly and 50% shorter than organizations that do not monitor and analyze... More

Frankenstein Fraud, Deepfakes, Replay Attacks: How to Identify Identity Fraud Threats (Raconteur)

Online fraud has accelerated during the coronavirus pandemic, meaning organisations must be more vigilant in the face of the seemingly ever-increasing threat and its impact on busi... More

Listen Carefully: The Growing Threat of Audio Deepfake Scams (Tech Monitor)

AI software capable of cloning voices is proving a useful weapon for fraudsters.... More

Mobile Commerce Could Lead to Biometrics Boom by 2025 (Tech HQ)

Contactless transactions utilizing an aspect of biometric authentication is predicted to increase by over 520% in the time between 2020 and 2025. Just last year alone, biometrics a... More

Stacking CDNs for Improved Performance, Security (Akamai Blog)

Using an eCDN as an origin is very similar to using a traditional origin, except we will be fetching content from a CDN server rather than a hosted instance of your application.... More

How to Secure the Cloud as a Universal Production Resource? (2030 Vision Blog)

The complexity of delivering security to cloud users far beyond the perimeters of any facility needs a new approach to security.... More

Network Security: Predictions for 2021 (Palo Alto Networks Blog)

The simplest way to summarize 2020 is with one word: unpredictable.... More

Payment Security Issues Remains a Big Worry for Online Retailers, Consumers (Twice)

Report finds consumers are looking for safer and more secure ways to pay.... More

Shadow IT: Addressing the Risks in Remote Work Environments (Security Intelligence)

Shadow IT can cause big problems for cybersecurity. The trouble is in the name: these connections exist in the shadows outside of IT (information technology) and security personnel... More

Spotify Just Invented AI Technology That Will Police Songwriter Plagiarism (MBW)

Songwriters of global hits getting sued for alleged plagiarism has become a recurrent story these past few years – and a recurrent source of misery for writers and their represen... More

Sign up for our newsletters
* indicates required
MESA Newsletters