Technology

 

AI on the Email Offense (Dark Reading)

Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.... More

Jailbreaking is Killing Your App Security (Irdeto Persepctive)

Software and data transformation to make reverse engineering difficult remains important, but in a war against hackers and competitors, a single line of protection is not enough �... More

Email is Still a Hacker’s Wonderland (CIO Dive)

Half of hacked email accounts are compromised for less than 24 hours, according to a new report. The majority of attackers, 78%, stayed within email accounts, suggesting cloud-base... More

Caringo Adds Seamless Disaster Recovery Service Powered by Wasabi (CDSA)

Caringo announced the launch of the Swarm Cloud DR managed service, powered by Wasabi Hot Cloud Storage. The combined solution leverages the enterprise data protection methods that... More

Gartner Shrinks Infosec Spending Forecast for 2020, Cloud Security Gets COVID-19 Boost (CIO Dive)

Gartner expects spending on information security to increase just 2.4% this year, down from December projections of 8.7% growth, according to the firm's analysis. Spending is expec... More

Cyberhaven Honored for Data Protection Work (CDSA)

Cyberhaven was named a 2020 Fortress Cyber Security Award winner in the Data Protection category. The company also unveiled new continuous monitoring and real-time discovery capabi... More

Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)

With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More

Mobile Phishing Incidents are Growing, and Costing Companies Millions (Verdict)

Mobile phishing incidents targeting enterprises are on the rise, with the cost of single incidents potentially running into the hundreds of millions, according to new research.... More

Akamai CTO on How Bots are Used Online in Legal, Illegal Ways (Tech Republic)

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle. ... More

NAGRA NexGuard Forensic Watermarking Nabs Two Awards (CDSA)

NAGRA announced that its latest NexGuard forensic watermarking solutions won multiple top honors at the NAB Show Express Special Edition Best of Show Awards 2020, presented by Futu... More

Zero Trust for Maximum Security in a COVID World (Thrive)

While companies face myriad challenges during this time, it is critical that C-level executives keep security top of mind. The reason? COVID-19 has brought a dramatic change to the... More

The Evolution of Enterprise Security Systems, Best Practices by Alibaba (Alibaba Cloud Blog)

For Alibaba Cloud, which provides infrastructure products, the key risk domains for cloud computing businesses include hardware, systems, networks, and user compliance. The focus a... More

Business Continuity and Security in a Remote Work Era (Illumio Blog)

The unprecedented social distancing measures have created a unique and somewhat unexpected challenge for many IT and risk teams. Business Continuity Planning strategies often cente... More

COVID-19 Lockdown: What ISPs Should Learn About Parental Controls (Irdeto Perspective)

Screen use is rocketing all round, for kids and for adults who are often simultaneously being parent, teacher and home-office worker. Families can’t always be present to effectiv... More

Why It’s Make-or-Break Time for the World’s VPN Market (TWA)

The thousands of workers performing their duties remotely over the past few weeks are facing a barrage of cybersecurity risks. Enterprise security teams have been scrambling to ado... More

6 Micro-Segmentation Requirements for Modern Applications (Illumio Blog)

The idea of segmenting the network as a way to increase security is not a new one. But it has been difficult to achieve granular segmentation because compute and security have been... More

A CISO’s Perspective on Implementing a Safety Net for Data in Times of Crisis (Cyberhaven Blog)

Remote work poses more challenges and more risk for sensitive data. Employees are more likely to resort to shadow IT to share sensitive data, such as copying sensitive information ... More

Securing the New Remote Workforce (Illumio Blog)

Recent change means the workforce isn’t interacting with the IT estate in the same way it was a few months ago. The perimeter in 2020 includes personal devices, home routers, sma... More

Remote Working: The Security Questions Clients are Asking (Avanade Insights)

How to keep your data safe through to ensuring secure collaboration.... More

How ZOO Keeps Content Secure Through the Entire Dubbing Workflow (ZOO Digital Blog)

As a dubbing services provider for the biggest names in entertainment, we recognize that we’re dealing with some of the most sought-after TV and movie content around. But how do ... More

Sign up for our newsletters
* indicates required
MESA Newsletters