Security

 

Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience (Security Intelligence)

Gone are the days when a masked robber would walk into a bank, wave a gun in the air and declare, “This is a stick up!” Why would any criminal run the risk of getting caught in... More

Infusing Security Into Digital Engineering (Digitally Cognizant Blog)

The digital economy calls for solutions to be built with digital technologies from the ground up. However, this can result in a double-edged sword: The more a solution relies on di... More

Report: Facebook Shopping Around for a Cybersecurity Firm (TNW)

Facebook’s had a bad year handling user data and securing its systems. Now, according to The Information, the company is looking to acquire a major cybersecurity firm to help rep... More

Is Employee Negligence Threatening Your Information Security? (Security Intelligence)

Between bring-your-own-device (BYOD) policies, shadow IT and an increasingly mobile workforce, companies today are wrapped up in broad potential attack surfaces from employee negli... More

IBM Takes Cybersecurity Training on the Road (NY Times)

Two years ago, IBM opened one of the nation’s first commercial cybersecurity ranges in Cambridge, Mass., to let companies practice responding to simulated cyberattacks. It descri... More

Unfilled Cybersecurity Jobs Reach 2.9M Worldwide (Verdict)

The shortfall is hitting private businesses hard, with 63% of organisations saying they now have a shortage of dedicated cybersecurity staff. The news comes as cybersecurity salari... More

Why Cloud Security is the Top IT Budget Priority for 2019 (TechRepublic)

More than half of companies (54%) share the fear that they may soon outgrow their current security solutions, according to a new report. Shifts in corporate infrastructure will lea... More

The App Explosion and Digital Transformation Drive Rapid Growth of the Identity Management Market (DXC Technology)

The identity management market is growing much faster than the overall IT market, and for good reason. While the enterprise IT market is expected to grow by 3.5 percent through 201... More

How Do Cyber Criminals Hack Small Business Startups? Here’s What We Learned from Microsoft (USA Today)

There are all sorts of ways the bad guys can get log-in credentials and other critical data from your business — they can send you a fake phishing email that looks totally legit ... More

The Future of the Fintech Will Require Security, Not Just Innovation (IT Pro Portal)

For IT leaders the cloud is crucial as it supports the rapid, continuous development of application-based services, enabling firms to react quickly to market demand with innovative... More

Irdeto Opens Pontiac Office (CDB)

Irdeto has signed a three-year lease to take up 2,500 square feet in the Riker Building in Pontiac, MI. The company celebrated the opening of the new office Wednesday afternoon. Wi... More

As IoT Security Concerns Rise, are Solutions Keeping Up? (Security Intelligence)

Many objects nowadays can be turned into internet-connected devices, and any one of them can make its way into the workplace. In fact, Gartner expects more than 65 percent of enter... More

How Analytics Can Help You Better Understand Access Risks (Security Intelligence)

Cloud, the Internet of Things, mobile and digital business initiatives have broadened the surface and increased the complexity of identity and access management (IAM) environments.... More

What a CIO Needs to Know About Cloud Security (eWeek)

Major data breaches are no longer a rare occurrence in the business world. It comes as no surprise, under those circumstances, that cybersecurity in general is a hot topic. With cl... More

Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data (SecurityIntelligence)

We all know that data is the most valuable intangible asset for a digital business. As data continues to grow in volume, variety and velocity, organizations are forced to take a fr... More

46% of Enterprise Brands Fear Website Data Dreach (The Drum)

Close to half of all enterprise brands believe they have a probable (or greater) risk of a website data breach, according to new research undertaken by data management specialists ... More

Verizon Digital Media Services Adds Managed Security Services to Its Cloud Solution for Enterprises (MESA)

Verizon Digital Media Services today announced it has added a round-the-clock managed cloud security offering as part of its global Cloud Security Solution. The managed cloud secur... More

How Hackers Talk Their Way Into Getting Company Secrets (WSJ)

Often it begins with an innocuous-seeming email from an internet domain that closely resembles the victim’s. The message may appear to come from the company’s chief executive o... More

How to Secure a Premier League Football Team (Forbes)

Arsenal is preparing to play Everton in the Premier League this Sunday. Led by manager Unai Emery, the team will currently be researching its opposition and formulating a game plan... More

What Is Shadow IT and Why Should You Care? (TechHQ)

The most prevalent form of Shadow IT refers to cloud services, especially software as a service. As valuable as distributed data storage has become, the rise of the cloud has fuele... More

Sign up for our newsletters
* indicates required
MESA Newsletters