Technology

 

Irdeto, VOXX Automotive Bring Simple, Secure Key Management to Fleet Owners (CDSA)

Fleet owners, new car dealers and ride sharing companies are embracing digital transformation. The implementation of connectivity has provided numerous ways to solve real business ... More

Understanding Cybersecurity in the World of Risk Society (Verdict)

As technology constantly evolves, we want to take advantage of it to make our lives easier and more successful. The data we provide to organisations we use for social and business ... More

Can AI, Blockchain be Used in Fight Against Deepfake? (IA)

Deepfakes are hitting the news with more frequency, what is the fix? Can AI and blockchain be used in the fight against deepfake? ... More

A Controversial Plan to Encrypt More of the Internet (Wired)

The security community generally agrees on the importance of encrypting private data: Add a passcode to your smartphone. Use a secure messaging app like Signal. Adopt HTTPS web enc... More

ORock HighCloud Achieves FedRAMP Ready Milestone (CDSA)

ORock Technologies announced that ORock HighCloud, the company's new cloud service for U.S. Federal Government agencies, received a "FedRAMP Ready" designation from the Federal Ris... More

As GDPR Rocks the EU Ad-Tech World, Vendors Must Learn to Adapt (Adweek)

Since May 2018, General Data Protection Regulations (GDPR) have been enforceable across the EU, with ad-tech companies both big and small now facing fundamental questions over thei... More

Microsoft’s Azure Sentinel SIEM Service Now Commercially Available (Redmond)

Azure Sentinel, Microsoft's cloud-based security information and event management (SIEM) solution, has reached the "general availability" release stage. The solution had been at th... More

Clever New DDoS Attack Gets a Lot of Bang for a Hacker’s Buck (Wired)

One of the trickiest things about stopping DDoS attacks is that hackers develop new variations on familiar themes. Researchers from Akamai's DDoS mitigation service Prolexic detail... More

Putting Data Security at the Heart of Digital Transformation – From Culture to Code (Cloud Tech)

In the new digital economy, data is the most valuable asset a company possesses. However, according to a recent survey by IDC, the spending ceiling for data security is as low as s... More

Is Blockchain the Next Big Thing for Cybersecurity? (Avanade Insights)

Originally created to power the cryptocurrency Bitcoin, blockchain is a decentralized ledger that records all the transactions that are ever conducted within a peer-to-peer network... More

Dark Times Ahead as Cybercriminals Target Power Grids (Verdict)

Power grids in particular are being targeted by state-sponsored cybercriminals, with the intention of causing outages that could bring victimised regions to a screeching halt. Iron... More

Protecting Smart Cities (TechNative)

The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More

Illumio Achieves Federal Common Criteria Certification for Enterprise Security Management (CDSA)

Illumio announced that it has completed the rigorous and comprehensive security testing and evaluation for Common Criteria certification. Illumio's solution is now the first segmen... More

Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More

Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)

IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More

Integrating IoT With Blockchain: A Trust and Security Game Changer (IA)

In business today, gathering data and exploiting it is the name of the game. Data should be driving decisions and digital transformation. But, how can organisations tap into the in... More

For IT Decision Makers, Data Security, AI are Top Priorities (CMO)

For years companies have been talking the talk about replacing their organizational silos with more cross-functional collaboration. According to new research, it appears some are n... More

Apple Reminds Us That Behind the AI Revolution Lies an Army of Humans Seeing Our Data (Forbes)

Apple’s concession last week that it relies on an army of human contractors to review a small portion of the recordings from Siri activations reminds us just how much the AI revo... More

How to Handle the Legal Implications of a Data Breach (Tech HQ)

Preparation can help limit damage and speed up recovery when the worst case happens.... More

Deepfakes Pose Increasing Legal, Ethical Issues for Hollywood (THR)

Ultra-realistic manipulation of digital imagery could open up new horizons for filmmaking, but lawmakers are only beginning to grapple with the issues and unanswered questions it p... More

Sign up for our newsletters
* indicates required
MESA Newsletters