Cyber Security

 

Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line (Security Intelligence)

In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become mo... More

The Future of Machine Learning in Cybersecurity (CIO)

Why has machine learning become so vital in cybersecurity? This article answers that and explores several challenges that are inherent when applying machine learning.... More

NAGRA Wins CSI Award for Holistic Cyber Protection

NAGRA announced that its Holistic Cyber Protection has won the 2022 CSI Award in the Best Cybersecurity Product or Service category. The solution combines NAGRA’s anti-piracy int... More

AI Has Bigger Role in Cybersecurity, but Hackers May Benefit the Most (CNBC)

Artificial intelligence is playing an increasingly important role in cybersecurity — for both good and bad. Organizations can leverage the latest AI-based tools to better detect ... More

The Modern CISO: Today’s Top Cybersecurity Concerns and What Comes Next (CD)

CISOs are up against talent shortages and retention concerns amid an increasingly sophisticated threat landscape.... More

Chief Information Security Officers: Here Are Insights on Setting 2023 Priorities (Forbes)

The surge in breaches, ransomware, legislation, and third-party requirements over the last five years has forced executives outside the security organization to recognize the impor... More

What is the Role of an MSSP In a Ransomware Attack? (Fortinet Blog)

While ransomware as an extortion attack type is not new, the tactics, techniques and procedures used by used by threat actors are constantly evolving and more dangerous than ever b... More

Security Automation Can Save You $3.05M in a Data Breach (Security Intelligence)

When it comes to reducing security breach costs, companies with security AI and automation can save millions, per a new report.According to the most recent IBM Cost of a Data Breac... More

How to Prevent Revenue Loss Due to Credential Sharing (PallyCon Blog)

It is one of the worrying factors in the OTT industry as the losses due to it are mounting. According to Citi analyst Jason Bazinet illegal sharing of subscription streaming servic... More

Fastly Named Challenger in Gartner Magic Quadrant Report (SB)

Lakshmi Sharma, Chief Product and Strategy Officer at Fastly, says, “We believe Fastly being named a Challenger, along with our recent recognition as the Customer's Choice for We... More

Fortinet’s Ken Xie Talks Business Momentum, Quarterly Earnings, Customer Challenges

An evolving threat landscape, an ongoing cybersecurity skills gap and the explosion of the edge with work-from-anywhere means traditional network and security architectures no long... More

Rising to the Challenge – Protecting Live Sports Streaming (NAGRA Blog)

Rafael Rivera explores the dynamics of sports fans and how streaming operators must proactively protect live sporting events to protect revenues.... More

United Cloud Leverages NAGRA Forensic Watermarking Solutions

NAGRA announced that United Cloud, the innovation center of the United Group, has selected NAGRA’s NexGuard Watermarking to expand its security solution, ensuring OTT content pro... More

Cybersecurity Spending Strategies in Uncertain Economic Times (CD)

The need for strong cybersecurity programs doesn’t make it immune to cuts.... More

New Cybersecurity Regulations are Coming (HBR)

A whole suite of new cybersecurity regulations and enforcement are in the offing, both at the state and federal level in the U.S. and around the world. Companies don’t need to ju... More

Data Poisoning and Its Impact on Cyber and AI (TM)

Data poisoning is becoming more dangerous than traditional attacks. Instead of attacking from the outside, data poisoning attempts to make the inputs accepted into the training dat... More

Are SASE and Zero Trust the Key for Manufacturers Grappling With IoT? (Palo Alto Networks Blog)

As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses and across supply chain infrastructure is exploding. Man... More

How and Why Do Teens Become Cyber Criminals? (Security Intelligence)

Reducing cyber crime committed by teenagers starts with knowing their motivation and paths. Of course, each person has their own reasons for their actions. Many teens start hacking... More

Two Key Trends That Will Shape the Future of Your Security Team in 2022/2023 (Fastly Blog)

The world changed when the pandemic hit in 2020, leaving organizations unsure of how it would affect the future. Security leaders may have found themselves wondering if their long-... More

NEC Forges Fortinet Into Its 5G Security Service (SDxCentral)

NEC is providing its professional services and 5G expertise with service providers, while Fortinet is providing its FortiGate next-generation firewall. The combined platform will p... More

Sign up for our newsletters
* indicates required
MESA Newsletters