Cyber Security

 

FortiGuard Labs: Beware of Cybercriminals Preying on Online Shoppers on Black Friday

The upcoming holiday season provides a heartful and joyful sensation that is a welcome relief from our other cares. So, between now and the advent of our various celebrations, it�... More

Ransomware-as-a-Service Transforms Gangs Into Businesses (Security Intelligence)

Malware-as-a-Service is getting easier and easier to access, according to a recent threat report. Self-named the ‘Eternity Project’, this cyber threat group offers services fro... More

Top Cybersecurity Threats For 2023 (Tech Republic)

Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and... More

Moving at the Speed of Business: Challenging Our Assumptions About Cybersecurity (Security Intelligence)

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in variou... More

Cyber Risk Management Lessons From the Battlefield (Fortinet Blog)

There are numerous parallels between the armed forces and cybersecurity. The skills that members of the military use each day—from honing their situational awareness to cultivati... More

Verimatrix Streamkeeper Wins Award For ‘Revenue Security’

Latest industry accolade further positions Streamkeeper’s splash in the industry as a momentum-gaining and innovative cloud-based Multi-DRM, watermarking, anti-piracy and cyberse... More

OTT Service Theft: Why DRM Isn’t Enough to Protect Your Streaming Service (Synamedia Blog)

We described how pirates exploit various tokens to carry out common hacks on video streaming services. In this post, we’ll look at the vulnerabilities of DRM from two different p... More

Marc Witteman on the Roots of Riscure, Device Security, and Pre-Silicon (Riscure Blog)

The story of Riscure, like with many other technology businesses, started in the garage. Dissatisfied with the quality of then available hardware testing tooling, Marc Witteman fou... More

Fortinet Makes Anywhere The Office, Securely (CRN)

The Fortinet Security Fabric brings together endpoint security, zero trust access and network security in one unified portfolio with solutions that seamlessly follow and protect yo... More

Effectively Enforce a Least Privilege Strategy (Security Intelligence)

Every security officer wants to minimize their attack surface. One of the best ways to do this is by implementing a least privilege strategy. One report revealed that data breaches... More

Is It Time For ECDSA Certificates? (Fastly Blog)

RSA certificates are more widely adopted than ECDSA certificates. Is it time for your organization to make the change?... More

Web3 is Meant to Be More Secure, But Can It Handle Sophisticated Cyber Threats? (The Recursive)

Imagine that you are checking your social media, and see that one of your favorite influencers has shared a link for minting free NFTs… What do you do next, do you just click on ... More

The Real Cost of Ransomware Is Even Bigger Than We Realized (ZDNet)

Ransomware attacks are often talked about in terms of the financial cost. But in reality, these incidents can have a much bigger impact.... More

Defending Education from Cyber Threat Attackers (Security Intelligence)

The X-Force Threat Intelligence Index consistently ranks education as one of the top ten targeted industries. Ransomware and adware are the top two attack types against education, ... More

Mitigating Threats and Vulnerabilities Isn’t Enough to Effectively Manage Your Organization’s Risk (Fortinet Blog)

Have you skimmed the headlines in your go-to cybersecurity trade publication today? If so, you’ve probably seen numerous articles about the latest threats and vulnerabilities, al... More

Is Your Mobile Game Immune From Cheating? (Irdeto Insights)

Everyone wants to win a game, but not all the wins are legitimate. More and more cheats are being created to help players succeed in mobile games. This is undoubtedly one of the mo... More

CISOs, Board Members and the Search for Cybersecurity Common Ground (Decipher)

While boards and CISOs have vastly different roles and priorities, collaboration between the two is fundamental for making key prioritization, strategic and budgetary decisions, an... More

Cybersecurity Is Entering the High-Tech Era (Forbes)

There’s a sea change underway in how the federal government—specifically the Defense Department—is going to approach cybersecurity. It’s one that’s going to create a more... More

Becoming a CISO: Tips on How to Approach the First Few Months on the Job (Cybersecurity Dive)

Start with building a team and identifying key stakeholders. Then, once your team is together, toss out everything you planned to do.... More

Fortinet’s Chris Roberts Talks Cybersecurity, Automation (IT Security Guru)

Chris Roberts, Business Development at Fortinet, chats about how to better understand how the cybersecurity industry is using automation, whether there will come a point where huma... More

Sign up for our newsletters
* indicates required
MESA Newsletters