Technology
Akamai Focused on ‘What’s Next’ Following New Traffic Milestone
Akamai hit a new milestone last week when web traffic delivered across the edge network peaked at 200 terabits per second (Tbps). To be blunt - that's a whole lot of data traveling... More
Threat Intelligence is Undergoing its Renaissance (ITProPortal)
With a rapidly changing cybersecurity environment, threat intelligence can lead the way to a more agile framework.... More
Size Does Not Mean Compromise – Mobile Game Protection is Affordable for All Studios (Irdeto Insights)
Game publishers and developers spend weeks, months and years working on new and exciting mobile games. They invest their time, hard work and creativity into their games. However, a... More
Palo Alto Networks, Alkira Partner to Drive Koch Industries Network Cloud Transformation
Palo Alto Networks announced today that Koch Industries has initially deployed the combined offering of Alkira's Cloud Services Exchange and Palo Alto Networks VM-Series Virtual Ne... More
Ransomware as a Service is the New Big Problem for Business (ZDNet)
Easy-to-use ransomware as a service schemes are booming, accounting for almost two-thirds of ransomware campaigns during the past year, warn researchers.... More
Can Audio-Only Social Networks Compromise Data Privacy? (TechHQ)
Clubhouse resembles a smartphone-based version of conferences but as it continues to expand, its security and privacy failings have come under increased scrutiny.... More
The Rise of ‘Shadow Code’ Leaves Websites Vulnerable to Data Breaches (Tech Monitor)
Using third-party code can aid swift digital transformation but, unless properly governed, it can open the door for security flaws.... More
Irdeto Wins Big at the Cybersecurity Excellence Awards 2021
Irdeto has won 20 awards at this year’s Cybersecurity Excellence Awards, highlighted by recognition as ‘Best Cybersecurity Company Europe’ as well as ‘Most Innovative Cyber... More
BuyDRM Secures Video Workflows in Google Cloud
BuyDRM’s KeyOS Technologies are focused on the media and entertainment verticals. (more…)... More
Irdeto Seals Partnership With KAON Broadband
KAON has successfully integrated Trusted Home agent into its latest DOCSIS 3.1 WiFi 6 broadband customer-premises equipment. (more…)... More
Creating a Fraud Risk Scoring Model Leveraging Data Pipelines, ML With Splunk
Organizations that undertake proactive data analysis techniques, experience frauds that are up to 54% less costly and 50% shorter than organizations that do not monitor and analyze... More
Frankenstein Fraud, Deepfakes, Replay Attacks: How to Identify Identity Fraud Threats (Raconteur)
Online fraud has accelerated during the coronavirus pandemic, meaning organisations must be more vigilant in the face of the seemingly ever-increasing threat and its impact on busi... More
Listen Carefully: The Growing Threat of Audio Deepfake Scams (Tech Monitor)
AI software capable of cloning voices is proving a useful weapon for fraudsters.... More
Mobile Commerce Could Lead to Biometrics Boom by 2025 (Tech HQ)
Contactless transactions utilizing an aspect of biometric authentication is predicted to increase by over 520% in the time between 2020 and 2025. Just last year alone, biometrics a... More
Stacking CDNs for Improved Performance, Security (Akamai Blog)
Using an eCDN as an origin is very similar to using a traditional origin, except we will be fetching content from a CDN server rather than a hosted instance of your application.... More
How to Secure the Cloud as a Universal Production Resource? (2030 Vision Blog)
The complexity of delivering security to cloud users far beyond the perimeters of any facility needs a new approach to security.... More
Network Security: Predictions for 2021 (Palo Alto Networks Blog)
The simplest way to summarize 2020 is with one word: unpredictable.... More
Payment Security Issues Remains a Big Worry for Online Retailers, Consumers (Twice)
Report finds consumers are looking for safer and more secure ways to pay.... More
Shadow IT: Addressing the Risks in Remote Work Environments (Security Intelligence)
Shadow IT can cause big problems for cybersecurity. The trouble is in the name: these connections exist in the shadows outside of IT (information technology) and security personnel... More
Spotify Just Invented AI Technology That Will Police Songwriter Plagiarism (MBW)
Songwriters of global hits getting sued for alleged plagiarism has become a recurrent story these past few years – and a recurrent source of misery for writers and their represen... More