Security

 

Measuring Security Operations Center Effectiveness Globally (Security Intelligence)

Do you know what is it like to measure and optimize global security operations centers (SOCs)? This measurement ensures there’s an end-to-end, streamlined and seamless security w... More

Zero Trust Isn’t Zero Sum: Let User Behavior, Risky Devices Dictate Security Hurdles (Forbes)

We’re going to talk about Zero Trust, but the point here is not to raise your blood pressure; it’s to get some things straight. Everyone’s talking about Zero Trust these days... More

Why Security Needs to be Integral to DevOps (Forbes)

DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and... More

Why Cyber Ranges are Effective to Train Your Teams (Security Intelligence)

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that ... More

Microsoft Boosts Azure Data Security With New Improvements (IT Pro Portal)

Microsoft has extended Advanced Threat Protection for Azure Storage to cover documents held in Azure Files and Azure Data Lake Storage Gen 2.... More

Fix Shadow IT In Your Organization (Security Intelligence)

Shadow IT can be potentially harmful to a company’s security protection, because it exists outside a company’s typical software and service approval and audit workflows. Shadow... More

NAGRA NexGuard Forensic Watermarking Integrates With AWS (HITS)

Content protection and multiscreen TV solutions firm NAGRA has announced API integration of its NexGuard forensic watermarking technologies into Elemental MediaConvert, the file-ba... More

Untrained and Malicious Users Lead IT Team Concerns (IT Pro Portal)

If there's one thing that keeps IT pros awake at night, it's untrained staff using shadow devices and apps.... More

Changes Set to Impact CISOs in a Post-Pandemic World (Forbes)

Currently, many CISOs are working remotely and leading security programs as they assist IT teams who are caring for employees that have transitioned from an office environment to o... More

Why Securing Endpoints is the Future of Cybersecurity (Forbes)

Verizon’s DBIR reflects the stark reality that organized crime-funded cybercriminals are relentless in searching out unprotected endpoints and exploiting them for financial gain,... More

Antivirus, Firewalls Top Security Solutions for Remote Work (CIO Dive)

Companies using a hybrid model of physical and virtual solutions chose favorites in a hurry this year. The rapid leap to cloud-based solutions reaffirmed the technology's necessity... More

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus (Security Intelligence)

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly ... More

Stronger Together: Building Cyber Resilience (Security Intelligence)

In January, the World Economic Forum again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of work... More

What the Data is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic (Security Intelligence)

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. I... More

Akamai to Help Combat Credit Card Skimming, Sophisticated Magecart-Style Attacks With Page Integrity Manager (HITS)

Akamai announced the launch of Page Integrity Manager, an in-browser threat detection solution designed to uncover compromised scripts that could be used to steal user data or impa... More

Akamai Helping Remote Workers Secure Access to Apps for Business Productivity (DataQuest)

Akamai’s Business Continuity Assistance Program, armed with our enterprise security solutions, can be globally deployed in less than 15 minutes to secure and manage remote access... More

Support Remote Workforce Productivity With Secure Cloud Services (Security Intelligence)

The goal for your security team is to enable a seamless shift in work environments for employees and to ensure secure operations for your business no matter where users are located... More

Does Your Security Awareness and Training Program Account for Changing Work Environments? (Security Intelligence)

As businesses transition to remote work and many employees adjust to working from home, organizations need to stay focused on people-centric security. People-centric security place... More

How to Maintain Security When Employees Work Remotely: 4 Common Challenges (Enterprisers Project)

Security fundamentals still apply. But your previous definition of human error probably didn't account for an employee helping kids navigate distance learning, checking on a vulner... More

Legacy Technology Could Prove a Problem for Remote Working (Forbes)

Business continuity plans are being put to the test as organizations close their physical locations and enforce a rigid work from home policy. IT professionals have been forced to ... More

Sign up for our newsletters
* indicates required
MESA Newsletters