Security

 

How to Secure APIs, the New Shadow IT (New Stack)

API growth has risen exponentially over the past five years: an average of nearly 2,000 new web APIs have been added each year since 2014 (and there were less than 2,000 back in 20... More

Security Trends Your Company Needs to Embrace in 2019 (Entrepreneur)

3. The authentication revolution. Even though the value of the information we store online continuously grows larger, the tools we use to keep that data safe remain woefully obsole... More

Study: IT Professionals Concerned About Cyberwarfare, End Users, Conducting International Business (ZDNet)

It's not a matter of "if" companies will become a victim of a cyberwarfare or cybersecurity attack but "when," as both types of attacks grow more sophisticated daily, putting milli... More

Why the EU Is More Likely to Drive IT, Security Trends Than the U.S. (Security Intelligence)

The General Data Protection Regulation (GDPR) has been a game changer for data privacy, and U.S. companies are beginning to catch up to the EU in data management practices. However... More

IoT Security Market Will Hit $9.88B by 2025, as Privacy Issues Abound (Tech Republic)

The Internet of Things security market was worth $1.24 billion in 2017, but it is expected to his $9.88 billion by 2025, according to a recent report. With IoT products used for AI... More

Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets (Security Intelligence)

With millions of unfilled cybersecurity jobs and security experts in high demand, chief information security officers (CISOs) are starting to think outside the box to bridge the sk... More

How the Cloud is Transforming IT Roles (Forbes)

Prior to the cloud, security professionals were focused on policies and manual reviews. Now, they must focus on how to enforce those policies automatically and remove manual review... More

IBM’s Atlanta Team Designs Mobile Cybersecurity Training Simulator in an 18-Wheeler (Hypepotamus)

“You can bring in a group of corporate executives or security team and basically run them through what their worst day at work is going to feel like.” That’s how Caleb Barlow... More

How CIOs Can Manage Blockchain Security: 4 Tips (TechRepublic)

By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts. ... More

Study: Cybersecurity Skills Gap Growing Even Wider (IM)

With two-thirds of organizations already saying they have a shortage of cybersecurity professionals, the cyber security workforce gap is widening even more, to nearly three million... More

Businesses Increasingly Embracing BYOD Despite Data Security Fears (Verdict)

Businesses are increasingly allowing employees to bring their own devices, including smartphones, tablets and other devices, into the workplace. Known as BYOD (Bring Your Own Devic... More

NSS Labs Announces Results of 2018 Endpoint Detection and Response Group Test (HITS)

NSS Labs announced the results of its 2018 Endpoint Detection and Response (EDR) Group Test. Four products from market-leading security vendors were examined to help enterprises un... More

Dropbox Integrates with Google Cloud Identity for Advanced Security Features (ZDNet)

With the new Google Cloud Identity partnership, Dropbox said the goal is to give business users more flexibility to work across devices and platforms while maintaining security. An... More

Wipro Collaborates with Check Point Software to Offer Cloud Security Services (HITS)

Wipro today announced a new partnership with Check Point Software Technologies Ltd, a leading provider of cyber security solutions globally, to deliver Check Point’s advanced and... More

Why Website Maintenance is Essential for Small Businesses’ Cybersecurity (ITProPortal)

Investing time in ongoing website maintenance is a key way to ensure that your small business website is as protected as it can be against cyber-security threats.... More

How to Secure Mobile Messaging in Your Enterprise (Security Intelligence)

If consumers are using these apps to reach out to organizations, you can assume that your employees are doing the same — and likely on your network. If they’re communicating wi... More

CIOs Reveal Their Biggest Fears as IoT Deployment Ramps Up (CBR)

A new IoT survey reveals concerns CIOs have over the uptake and rollout of connected strategies and how they could impact business operations – and ultimately damage revenues. Th... More

Are You Spending Too Much (or Too Little) on Cybersecurity? (DCK)

Figuring out whether a data center is spending enough on cybersecurity is easy in theory but not in practice. First, you determine your appetite for risk. Second, you determine the... More

What Recruiters Need to Know About What Makes Cybersecurity Unique (Forbes)

Cybersecurity is under pressure. There are an increasing number of attacks, an increasing amount of regulation and a predicted skills shortage of 1.8 million workers by 2022. A key... More

5 Ways CISOs Can Improve Collaboration on Security Risks (Security Intelligence)

As operational and security risks converge in the enterprise, the role of the chief information security officer (CISO) is evolving and expanding. Today’s CISO is seated closer t... More

Sign up for our newsletters
* indicates required
MESA Newsletters