Cyber Security
Cybersecurity Priorities for Digital Leaders Navigating Digital Transformation (Equinix Blog)
With threat actors becoming more sophisticated, innovative, and collaborative, cybersecurity responsibilities today extend beyond security professionals—all digital leaders must ... More
Palo Alto Networks and Coordinated Enforcement for Malware
Information sharing for defense is as old as the carrier pigeon. In cybersecurity, coordinated enforcement between products has increasingly become part of the defensive backbone t... More
What Gartner’s Top Cybersecurity Predictions for 2022-23 Reveal (VentureBeat)
Together, Gartner’s top eight cybersecurity predictions warn organizations that they need to employ greater resilience to reduce the impact of more severe cyberattacks. Reducing ... More
The Cat and Mouse Game of Crypto Money Laundering (Decipher)
Cybercriminals are using an array of obfuscation tactics to conceal their illicit transactions. These measures are continuing to become more sophisticated, particularly as law enfo... More
Recovering Ransom Payments: Is This the End of Ransomware? (Security Intelligence)
What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a do... More
Palo Alto Networks Wins 2021 Google Cloud Technology Partner of the Year Award for Security
Palo Alto Networks was recognized for the company's achievements in the Google Cloud ecosystem, helping organizations rapidly transform security operations for future success. (mor... More
The Unrelenting Threat of Ransomware is Pushing Cybersecurity Workers to Quit (ZDNet)
Cybersecurity professionals face immense pressure to keep businesses secure, and this stress is leading many to consider leaving the industry altogether.... More
9 Ways Hackers Will Use Machine Learning to Launch Attacks (CSO)
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors ... More
Unlocking the Changing State of Hybrid Workspace Security (Teradici Blog)
The pandemic has irrevocably changed workspaces for businesses of all sizes. The sudden and necessary shift to working from home continues to have lasting effects, evident in the w... More
IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management
Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. ... More
Palo Alto Networks Founder: Machines Should Run SOCs, Not Humans (SDxCentral)
Palo Alto Networks CTO and founder Nir Zuk expects more vendors will follow its lead to offer an autonomous security operation center (SOC) to replace legacy security information a... More
Cybersecurity M&A Activity Shows No Signs of Slowdown (Dark Reading)
But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.... More
Why Phishing is Still the Top Attack Method (Security Intelligence)
Phishing is the most common way for threat actors to gain access to victims’ networks, according to this year’s IBM Security X-Force Threat Intelligence Index. Approximately 41... More
My Journey at Riscure: Siebe Krijgsman (Riscure Blog)
Siebe Krijgsman, Principal Engineer at Riscure, compares fundamental security topics to old action movies. He discusses the differences between various Riscure tools and the challe... More
Cybercriminals Target Metaverse Investors With Phishing Scams (CNBC)
Investors across the country told CNBC that hackers stole their land in the metaverse by tricking them into clicking on links they believed were genuine portals to the virtual univ... More
Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report (Security Intelligence)
Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-For... More
AI’s Role in the Future of Cybersecurity (Tech Radar)
AI is revolutionizing cybersecurity. From automatically detecting network irregularities, to deciding how best to allocate security defenses, some of the most data-intensive tasks... More
Fortinet Amplifies Threat Detection, Response With FortiNDR (SDxCentral)
Fortinet added a network detection and response (NDR) service powered by artificial intelligence (AI) into its threat detection and response portfolio. The FortiNDR uses AI capabil... More
Countdown to Ransomware: Analysis of Ransomware Attack Timelines (Security Intelligence)
IBM X-Force analyzed the evidence from multiple ransomware attack investigations that occurred between 2019 and 2021. In each investigation, access to the victim network was obtain... More
Tata Play Turns to Irdeto and Broadpeak for Cybersecurity (DTE)
The platform has implemented Broadpeak BkS350 Origin Packager pre-integrated with Irdeto Control and Irdeto Media Manager to the OTT aggregation platform, Tata Play Binge. The plat... More