Cyber Security

 

AWS Builds a Lake For Multivendor Security Data Sharing (Cybersecurity Dive)

Security data is scattered and often stored in fragments from multiple sources. AWS wants to centralize that in a single data lake.... More

What Does It Take to be Good at Cybersecurity? (CD)

Cybersecurity prowess requires defense in depth, and few enterprises meet that need. The difference between high, medium and low cyber maturity levels comes down to three sets of p... More

Cybersecurity, Cloud and Coding: Why These Three Skills Will Lead Demand In 2023 (ZDNet)

The demand for digital skills has accelerated considerably in 2022. As more companies lean on technology to innovate and future-proof their business, the pool of available software... More

FortiGuard Labs Contributes to INTERPOL Multinational Cybercrime Suppression Operation in Africa

FortiGuard Labs provided actionable threat intelligence over a six-month period, which consisted of botnet, command and control (C2), and malware infrastructure research, including... More

Deploying Security Automation to Your Endpoints (Security Intelligence)

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more press... More

Cleverbase Selects Verimatrix Code Shield For Strong Cybersecurity

E-signatures, login, encrypted information exchange and archiving within the Vidua app safeguarded against cyber-attacks by award-winning threat defense technologies. (more…... More

Complacency Is Your Biggest Data Breach Risk: 5 Steps to Avoid It (archTIS Blog)

Cyberattacks are still big business and on the rise. Despite substantial increases in cybersecurity spending, many businesses aren’t taking enough action to mitigate their risks.... More

The Metaverse Could Become a Top Avenue For Cyberattacks In 2023 (DarkReading)

Expect to see attackers expand their use of current consumer-targeting tactics while exploring new ways to target Internet users — with implications for businesses.... More

Fortinet Simplifies Network Security Operations on AWS With FortiGate CNF (HNS)

Fortinet launches FortiGate Cloud-Native Firewall (FortiGate CNF) on Amazon Web Services (AWS), an enterprise-grade, managed next-generation firewall service specifically designed ... More

Why Data and Analytics Are the New Defenses Against Cyber Threats (Raconteur)

As the move to the cloud intensifies, security professionals need analytics packages to crunch the data to highlight where bad actors might be lying in wait.... More

Mobile RASP Vs. Shielding Vs. In-App Protection (Verimatrix Blog)

We live in a mobile first world. This means any organization seeking to engage today’s and tomorrow’s customers needs to provide a compelling mobile experience.... More

FortiGuard Labs: Beware of Cybercriminals Preying on Online Shoppers on Black Friday

The upcoming holiday season provides a heartful and joyful sensation that is a welcome relief from our other cares. So, between now and the advent of our various celebrations, it�... More

Ransomware-as-a-Service Transforms Gangs Into Businesses (Security Intelligence)

Malware-as-a-Service is getting easier and easier to access, according to a recent threat report. Self-named the ‘Eternity Project’, this cyber threat group offers services fro... More

Top Cybersecurity Threats For 2023 (Tech Republic)

Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and... More

Moving at the Speed of Business: Challenging Our Assumptions About Cybersecurity (Security Intelligence)

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in variou... More

Cyber Risk Management Lessons From the Battlefield (Fortinet Blog)

There are numerous parallels between the armed forces and cybersecurity. The skills that members of the military use each day—from honing their situational awareness to cultivati... More

Verimatrix Streamkeeper Wins Award For ‘Revenue Security’

Latest industry accolade further positions Streamkeeper’s splash in the industry as a momentum-gaining and innovative cloud-based Multi-DRM, watermarking, anti-piracy and cyberse... More

OTT Service Theft: Why DRM Isn’t Enough to Protect Your Streaming Service (Synamedia Blog)

We described how pirates exploit various tokens to carry out common hacks on video streaming services. In this post, we’ll look at the vulnerabilities of DRM from two different p... More

Marc Witteman on the Roots of Riscure, Device Security, and Pre-Silicon (Riscure Blog)

The story of Riscure, like with many other technology businesses, started in the garage. Dissatisfied with the quality of then available hardware testing tooling, Marc Witteman fou... More

Fortinet Makes Anywhere The Office, Securely (CRN)

The Fortinet Security Fabric brings together endpoint security, zero trust access and network security in one unified portfolio with solutions that seamlessly follow and protect yo... More

Sign up for our newsletters
* indicates required
MESA Newsletters