Cyber Security

 

The Five Biggest Cybersecurity Trends in 2022 (Forbes)

Homeworking, the ongoing digitization of society, and the increasingly online nature of our lives mean opportunities about for phishers, hackers, scammers, and extortionists. There... More

Palo Alto Networks Appoints Helmut Reisinger to Leadership Team

Palo Alto Networks announced the appointment of Helmut Reisinger to the position of CEO for Europe, the Middle East and Africa (EMEA) and Latin America (LATAM). (more…)... More

CISOs Plan What to Buy With Funds From the Infrastructure Bill (Dark Reading)

CISOs welcome the cybersecurity funding allocated under the Infrastructure Investment and Jobs Act, but say it’s not perfect because it doesn't address a key issue: people.... More

Why the CISO Role is Evolving (CD)

CISOs are too focused on security operations, writing policies or vendor management, and less involved in business strategy, where their time is better spent.... More

The Matrix is the Best Hacker Movie (Wired)

Most people point to Sneakers, Hackers, or WarGames. They’re all wrong. The Wachowskis actually invented the ultimate cyber superhero.... More

The Future of Cyberattacks (ReadWrite)

Cyberthreats are growing in both scale and complexity, and the need to secure critical infrastructure by businesses and public organizations has never been as urgent as now.... More

One-Time Password Security Might Fail 80% of the Time – IAM is Better (Security Intelligence)

This type of password security is certainly better than traditional, static passwords. But recently security analysts discovered that you can buy an OTP interception service at you... More

Splunk for OT Security: Perimeter and Vulnerability Evolution

Owners and operators of Operational Technology environments are being increasingly tasked with providing more information and security controls for their OT Environments, whether t... More

Jim Cramer Talks With Palo Alto CEO Nikesh Arora (The Street)

Arora told Cramer that executives of companies have had to learn quickly about cybersecurity, as the problem has increased rapidly in magnitude. He predicted that 30-50 percent of ... More

Everyone is Burned Out – That’s Becoming a Security Nightmare (ZDNet)

Two years into the pandemic and the challenges around remote working are taking their toll. We're making bad tech security decisions as a result.... More

Online Criminals Have Created Their Pseudo Court System on the Dark Web (Fortune)

Online fraudsters have created an underground court system for settling disputes involving failed payments, product problems, and misrepresentation of services, according to a stud... More

Palo Alto Networks: Average Ransom Payment for Canadian Organizations More Than C$450K

Of the Canadian businesses hit by ransomware, a majority (58%) of IT decision-makers say their organization paid a ransom, with 14% saying their organization paid more than once. (... More

The Rise and Rise of Bug Bounty Hunting (Tech Monitor)

How an army of freelance white hat hackers are disrupting cybersecurity across the web.... More

Understanding the Adversary: How Ransomware Attacks Happen (Security Intelligence)

IBM Security X-Force Incident Response has responded to hundreds of ransomware incidents across every geography and industry. As we have taken time to analyze these incidents, a cl... More

7 Ways an Incident Response Retainer Can Increase Security Resilience (Palo Alto Networks Blog)

The number of cybersecurity incidents has increased amid the shift to remote work. Just in the past year, as many as 18,000 customers of SolarWinds unknowingly let in attackers thr... More

Crypto Becoming the Preferred Currency of Cybercriminals and Rogue Governments (CD)

The growth of cryptocurrency in cybercrime has coincided with the rise in ransomware. Nation-state cyber activity has become more brazen and sophisticated, threatening government a... More

Kudelski Security Enriches MDR Services With Integration of Microsoft Defender for Endpoint

Kudelski Security, the cybersecurity division within the Kudelski Group, announced the integration of Microsoft Defender for Endpoint with the company’s leading Managed Detection... More

Is ‘Gamification’ Key to Better Cybersecurity Training? (Tech Monitor)

A new approach is required to cybersecurity training, experts believe. Gamification techniques could help make courses more engaging.... More

Amazon Unveils New Security Features for AWS Lake Formation (VentureBeat)

Amazon Web Services announced new features for providing secure access to sensitive data in the AWS Lake Formation data lake service, with the introduction of row- and cell-level s... More

Client vs. Headend Watermarking – What’s the Best Approach for OTT? (Synamedia Blog)

In the first blog of this three-part series, Synamedia looks at how pirates attack watermarking solutions. Robustness, deployment and maintenance, user experience, content awarenes... More

Sign up for our newsletters
* indicates required
MESA Newsletters