Cyber Security

 

Security Automation Can Save You $3.05M in a Data Breach (Security Intelligence)

When it comes to reducing security breach costs, companies with security artificial intelligence (AI) and automation can save millions, per a new report.According to the most recen... More

IBC 2022: ‘Explore the Possibilities Beyond the Horizon’ With NAGRA

NAGRA will showcase its range of innovations, demonstrations and customer successes from across the Kudelski Group, at the IBC in Amsterdam, Stand 1.C81. From increasing subscriber... More

Cybersecurity Needs to Work Even When Employees Aren’t on Board (Security Intelligence)

Employee compliance with cybersecurity measures has always been a key component of digital defense. However, employees often either purposely don’t comply or make mistakes. The 2... More

Amazon Web Services’ Cybersecurity Chief Lays Out His Outlook for the Rest of 2022 (CNBC)

Amazon’s Chief Security Officer Steve Schmidt discusses the current and potential threats to companies that use cloud computing.... More

Fortinet Cloud-Native Security Integrates With AWS (SDxCentral)

Fortinet announced a new cloud-native protection service for multi-cloud environments that integrates with Amazon Web Services’ existing cloud security tools to provide actionabl... More

What’s New in the 2022 Cost of a Data Breach Report (Security Intelligence)

he average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a yea... More

The Rise of BYOD and How it Impacts Data Security (HP Teradici Blog)

BYOD, bring your own device, has become increasingly popular as more companies have started adopting hybrid work models. According to an HP Teradici Security Report, 48% of 8000 re... More

7 Ways to Bring AI to Cybersecurity (Dark Reading)

Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.... More

Palo Alto Networks: Phishing and Software Vulnerabilities Cause Nearly 70% of Cyber Incidents

According to a new report from Palo Alto Networks, the heavy use of software vulnerabilities matches the opportunistic behavior of threat actors who scour the internet for vulnerab... More

How Smart Homes Present Owners With Big Cybersecurity Risks (Verdict)

Smart homes have made people's lives more convenient, but they have also brought with them a range of cybersecurity risks.... More

20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet (Security Intelligence)

It was considered the “largest ever” internet attack in 2002. This distributed denial of service attack hit seven of the 13 servers at the top of the internet’s domain name s... More

6 Ways SASE Helps Protect Your Data (Security Intelligence)

You start to log in to work from the home office you’ve occupied for the last two years only to sit and wait patiently as your virtual private network (VPN) dials up. After a few... More

Security Obscurity Versus Ethical Hackers: Who’s Right? (Security Intelligence)

Security breaches can lead to damage to a business’s finances, operations and reputation. What many companies might fear most is the latter: damage to their reputation. This may ... More

2022 ASM Threat Report: Tending to Your Attack Surface Garden (Palo Alto Networks Blog)

Attack surfaces are living things – they grow and change. And, much like any living thing, they need constant care. To see how those efforts are going, the Cortex® Xpanse resear... More

What is Threat Hunting? (IT Pro)

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation.... More

5 Essential Steps for Every Ransomware Response Plan (SI)

Ransomware is a severe threat, no matter the season. For over three years, ransomware has been the most prevalent cybersecurity attack type, as the IBM Security X-Force Threat Inte... More

Cybersecurity and the Metaverse: Identifying the Weak Spots (VentureBeat)

If and when the metaverse emerges to supplant Web2, experts caution that these trends will only worsen and that the ramifications of cybercrime may, like the metaverse itself, be a... More

Devin Hill of Digital Silence Talks Cybersecurity

Devin Hill recently joined Digital Silence as Director of Digital Forensics and Incident Response. In this Q&A, Hill discusses a variety of topics related to cybersecurity.... More

5 Key Considerations for Your 2023 Cybersecurity Budget Planning (CSO)

An evolving threat landscape, regulatory requirement changes, and increases in cyber insurance are among leading factors that will impact next year's security budget.... More

FBI: Fake Cryptocurrency Apps Defrauded Hundreds of U.S. Investors (Decipher)

Cybercriminals have defrauded hundreds of U.S. investors by convincing them to download fake apps that impersonate legitimate cryptocurrency investment services, the FBI warned in ... More

Sign up for our newsletters
* indicates required
MESA Newsletters