Security

 

Google Cloud Security Updates Aim to Protect High-Value Users (DCK)

Google made several cloud security related announcements on Wednesday at Google Cloud Next, including context-aware access for Cloud Identity and Access Management, Cloud Identity-... More

Google Unveils Context-Aware Access Cloud Control (eWeek)

Google has introduced a new context-aware access control capability and hardware key based authentication support for enterprises using its cloud-computing platform (GCP). The new ... More

Here’s What Cybersecurity Professionals at Companies Actually Do, and Why They’re Vital (CNBC)

There's so much cybersecurity news these days, from stolen credit reports to the latest cybersecurity start-up, sometimes it feels like you need a decoder ring to make sense of it ... More

How Open Source Intelligence Could Save Your Network (Security Intelligence)

Imagine you’re an analyst working in a security operations center (SOC). An endpoint glows red on your dashboard, indicating that it’s trying to communicate with an unknown IP ... More

IBM Executive: Big Banks Like Deutsche Choose IBM to Run Their Blockchain for 3 Reasons (CNBC)

The key to IBM's robust blockchain business stems from three guarantees the sprawling technology company can make to its clients, SVP of IBM Global Markets Martin Schroeter said We... More

IBM Security Study: Mega Data Breaches Cost $40M to $350M (VentureBeat)

The average cost of a data breach is $3.86 million, according to a study by IBM Security and Ponemon Institute. But the cost of “mega breaches,” where 1 million to 50 million r... More

IBM Lands $740 Million Deal to Supply Data Security to Australia (Bloomberg)

IBM has secured a $740 million agreement to become a central technology partner of the Australian government over the next five years. The contract will see services such as automa... More

Attackers Targeting World Cup Fans with ‘Golden Cup’ Android App Loaded with Spyware (IT Pro)

Researchers have uncovered an emerging cyber threat targeting Android device-owning football supporters just as the 2018 FIFA World Cup reaches its climax. Believed to be part wide... More

Millennial Versus Mature – Who’s the Real IT Security Risk? (CW)

A major challenge to improving IT security has always been user resistance. If IT security is not almost transparent to the user, history and experience shows that some will alway... More

Goal! Spam Campaigns Capitalize on the World Cup Craze (SecurityIntelligence)

When it comes to online fraud lures, scammers and spammers gear up to send massive campaigns of malicious email messages to recipients who may or may not open them. To increase the... More

Is Corporate VPN Security Dead? (Security Intelligence)

The use of virtual private networks (VPNs) in the enterprise has come a long way. What was once a simple way to ensure a secure connection between an external network and a company... More

Cybersecurity – The Achilles Heel of Digital Transformation (IT Pro Portal)

Employee mobility, cloudification, and the Internet of Things (IoT), are all driving digital transformation, with companies becoming increasingly aware that they need to embrace ne... More

NSS Labs Announces Plans for 2018 Web Browser Security Report (CDSA)

Cybersecurity guidance firm NSS Labs announced June 13 it’s developing the next iteration of its Web Browser Security Comparative Test, with results expected out by the end of th... More

Wipro, Opera Solutions Launch Solution to Detect, Address Fraud and Waste in U.S. Healthcare (HITS)

Wipro today announced the launch of an end-to-end solution to address the issue of fraud, waste, and abuse in healthcare insurance claims in the United States, in partnership with ... More

Software Bugs Have a Bounty on Their Heads (WSJ)

Programmers know that it’s nearly impossible to write complex software without making a mistake. While most software glitches are merely annoying, serious security bugs can give ... More

With Cloud Security, the Devil’s in the Details (Forbes)

The cloud simplifies IT and offers a lot of value for companies. It can eliminate the need for rows and rows of on-premise servers and staff to manage them, providing elasticity to... More

GRIMM Launches Michigan Cybersecurity Research Lab (HITS)

GRIMM announced the opening of its new Grand Rapids, MI-based cybersecurity research lab. GRIMM’s new facility will enable the company to work more closely on cybersecurity initi... More

Dilkin to Lead Kroll’s Cybersecurity Business in Brazil (HITS)

Kroll today announced the appointment of Dani Dilkin as an Associate Managing Director in its Cyber Security and Investigations practice. Based in the firm's office in São Paulo, ... More

Blockchain Could Be the Answer to Cybersecurity – Maybe (WSJ)

One of the most promising cybersecurity tools that exists today is something many people have heard about but few fully understand: blockchain technology.... More

Should Companies Let Employees Use Social Media at Work? (WSJ)

Social-media use has become the norm in the U.S., with around 7-in-10 Americans now using platforms like Facebook, Twitter and Instagram to connect with others, share news and info... More

Sign up for our newsletters
* indicates required
MESA Newsletters