Security

 

Shadow IT is the Cybersecurity Threat That Keeps Giving All Year Long (Forbes)

Shadow personal IoT voice assistants, Amazon Kindles, smartphone, and tablet devices are proliferating across enterprise networks today, accelerated by last-minute shopping everyon... More

Google Cloud Hires Former DHS Chief as Head of Security (IT Pro Portal)

A high-ranking cybersecurity official from the US government is leaving her job and moving to Google, the company announced. Jeanette Manfra, who was the assistant director for cyb... More

Google Cloud Hires Former DHS Chief as Head of Security (IT Pro Portal)

A high-ranking cybersecurity official from the US government is leaving her job and moving to Google, the company announced. Jeanette Manfra, who was the assistant director for cyb... More

IBM AI Innovations Sharpen Risk Detection in Identity Management (HITS)

IBM Security announced it is extending its artificial intelligence technology originally developed to protect users in the financial services industry, to clients in all industries... More

Infosys Launches Cyber Next Platform-Based Offerings, Powered by Microsoft Azure Sentinel (CDSA)

Infosys announced the launch of its Cyber Next platform-based offerings, powered by Microsoft Azure Sentinel. These offerings will help enterprises enhance security monitoring, man... More

GDPR Is More Than a Legislation, It’s a Cultural Shift (CPO)

The General Data Protection Regulation (GDPR) marked a stake in the ground when it comes to data privacy, redefining our understanding of the value of the data organizations hold o... More

Three Key Ways Continuous Delivery Improves Your Security Posture (DXC Technology Blog)

Continuous delivery yields a host of IT and operational benefits, including proven competitive advantages like faster deployment times, responses to customer feedback, and bug fixe... More

Security Pros Fear Insider Attacks Stem from Cloud Apps (Dark Reading)

More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.... More

How to Keep IT Security Team Ahead of Alert Fatigue (CIO Dive)

Job burnout. It can happen to the best of us. One critical staffing issue is the rising problem of alert fatigue in IT security teams.... More

Cyber Threats Set to Double in 2020 (IT Pro Portal)

Many organizations are expecting the number of cybersecurity incidents to grow next year, but still aren't willing to purchase insurance and protect themselves, according to a new ... More

8 Tips for More Secure Mobile Computing (Dark Reading)

Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.... More

Improving Endpoint Security Needs to Be a Top Goal In 2020 (Forbes)

Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have ... More

Poor Cyber Resilience: An Organization’s Achilles’ Heel (CIO)

Digital advances are recreating global business through ongoing advances in artificial intelligence, the Internet of Things (IoT), data availability, blockchain, and other key area... More

What are the Key Risks of Cloud Computing? (NCC Group Blog)

The continued reliance on cloud computing shows no indication of slowing, with the global public cloud computing market set to reach $258 billion in 2019 and roughly a third of a t... More

Why the Future of Data Security in the Cloud is Programmable (Cloud Tech)

It’s the way software used to be purchased, and often still is. A CEO, or GM, or line-of-business owner calls into IT, and the security and compliance teams, to let them know tha... More

10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack (Security Intelligence)

Does ransomware respect the holiday season? With ransomware attacks attempted every 14 seconds, it’s not likely attackers take any days off. The threat of ransomware keeps growin... More

Tackling Disruption From New Digital Frontiers: Mitigating the Risk of Cyberattack (TechNative)

We are in the midst of unprecedented levels of digital disruption, which is proving hugely beneficial to industries all over the world. From enabling global expansion with more eas... More

Akamai Edge Platform Increases Security Protections for Content, Sites, Apps (MESA)

Akamai announced enhancements focused on maximizing security, quality, and reliability from the cloud to the digital touchpoint. With these new features, the Akamai Intelligent Edg... More

Four Steps to Mitigating Cloud Security Risks (Verdict)

The need for digital transformation has changed the mentality of decision makers who are now eager to benefit from the many advantages cloud services can bring to overall business ... More

Virginia a Hot Spot for Cybersecurity Jobs (Dark Reading)

Virginia currently ranks as one of the hottest states for cybersecurity professionals from a job opportunity and salary standpoint. New analysis placed the state in top spot for th... More

Sign up for our newsletters
* indicates required
MESA Newsletters