Security

 

AWS Pushes Forward on Cloud Security, Database, AI Initiatives (eWeek)

At the AWS Summit in Santa Clara, the public cloud provider announced several new services and capabilities, while reinforcing core elements of its platform growth including artifi... More

How Netflix Pioneered Chaos Engineering (Tech HQ)

Beyond savvy marketing and a flawless business model, its product matters most, and it’s at the coalface where Netflix’s engineers have pioneered new ground - a method of softw... More

Lack of Skills the Main Challenge in Recruiting Information Security Talent (IA)

Cybersecurity is a demanding profession and the required skillset is diverse, with a mix of technical, leadership, business and communication skills necessary to effectively protec... More

Five Tech Trends Driving Cybersecurity in 2019 (Forbes)

Bob Bruns, Avanade: When industry analyst Gartner listed its top 10 technology trends for 2019, one of the primary themes that stood out was cybersecurity. Things continue to move ... More

Survey: Cybersecurity Pros Believe They Should Have the Right to ‘Hack Back’ (CBR)

At a recent IT event several discussions took place around the topic of cyberattacks from nation state actors, a survey conducted found that 87% of security professionals believe t... More

Research: 80% of Security Pros Have Trouble Finding Skilled Workers (Tech Republic)

IT hiring managers have had trouble finding the right tech talent for a while, but this is mainly due to constantly changing threat vectors and emerging technology, the report foun... More

IT and Security Need to Start Playing Nice – Here’s How (Forbes)

Several technology trends are making it more important and difficult than ever for NetOps and SecOps teams to work together. Increased complexity, the explosive growth of cloud mig... More

IBM X-Force Red Launches New Service for Blockchain Security Testing (CDSA)

IBM Security's team of offensive security experts, X-Force Red, announced the launch of a new blockchain testing service to help identify weaknesses and strengthen security of a wi... More

A CEO Cheat Sheet for the Cybersecurity Big One (Forbes)

Breaches have become so commonplace they feel like they've become an accepted part of business as usual, but complacency is a mistake. In the Conference Board's 2019 C-Suite survey... More

Microsoft Azure Sentinel Moves SIEM to the Cloud (SDxCentral)

Ahead of the annual RSA Conference, Microsoft rolled out a new cloud-native security information and event management (SIEM) tool called Azure Sentinel, and a managed threat huntin... More

How Cybersecurity Skill Shortage is Impacting Incident Response (CIO Dive)

Cybersecurity reports tend to paint a pretty abysmal picture for companies. At the very least, they shed light on the impossibility of complete protection. The inability to properl... More

2019 Vulnerability Stats Report Out From edgescan (HITS)

edgescan released their "Vulnerability Stats Report 2019" which describes both internal and external facing risks faced by typical organizations across the entire stack from a cybe... More

7 Mobile Security Threats You Should Take Seriously in 2019 (IT World)

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year.... More

Five Cybersecurity Trends to Watch for in 2019 (Forbes)

4. User Awareness. Businesses will find it critical to keep their eyes peeled in 2019 for any potential risk that can come from their own users. This may include potential harm ari... More

Cybersecurity Starts with Access Control (Forbes)

Humans are often pegged as the weakest link in cybersecurity -- and to a great extent, that’s true. While training employees to think like hackers can certainly make your company... More

Cybersecurity Success Still Depends on Getting the Basics Right (Tech Wire Asia)

Cybersecurity is a big concern for most businesses, especially because of the regulatory scrutiny it attracts and the loss of consumer confidence it results in. And although hacker... More

Moving to the Hybrid Cloud? Make Sure It’s Secure by Design (Security Intelligence)

Many organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid cloud environment with data and workloads shared between pr... More

The Cloud’s Weakest Security Links Aren’t Where You’re Looking (InfoWorld)

You pride yourself on your cloud computing security strategy and tool stack. Indeed, your system made up of many security solutions is both proactive, and self-updating. So, you’... More

Old Password Habits Die Hard … If They Ever Die at All (DXC Technology Blog)

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to ... More

Email Attacks Increasingly Using Compromised Accounts (IT Pro Portal)

Hackers are realising that it’s easier to defraud someone if you’re using a legitimate email address, rather than creating one yourself. With that in mind, they’re increasing... More

Sign up for our newsletters
* indicates required
MESA Newsletters