Cyber Security

 

Machine Identity Remains a Mystery, Threatening Digital Security (CD)

As more companies undergo digital transformation and embrace hybrid cloud and multicloud environments, the number of machines that must be identified increases. Companies also need... More

Cyber Insecurity (Vistex Blog)

Global cyberattacks in the manufacturing industry have increased by almost 3,000% since 2012. This gives manufacturers like you a dubious distinction in the world of cybersecurity,... More

Fighting Cyber Threats With Open-Source Tools and Open Standards (Security Intelligence)

Detecting cyber threats is usually the first critical step in the mitigation of cyber attacks. Common means to achieve this goal are rules or analytics that track network and syste... More

Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Decipher)

For as long as there have been computers, there have been bugs. That’s damn near 100 years and an uncountable number of bugs. If they were discovered at all, most of those bugs w... More

The Top 5 Security Challenges for Retailers (Avanade Insights)

Protecting the brand from cyber threats as well as supporting investments to transform the business is an immense challenge, putting acute pressure on Chief Information Security Of... More

Palo Alto Networks Adds Cloud Misconfiguration Tool (Security Boulevard)

Palo Alto Networks revealed that its Bridgecrew by Prisma Cloud offering has been extended using another tool that now makes it possible to also detect configuration drifts across ... More

Reinventing Cybersecurity With Artificial Intelligence (The Record)

As traditional company barriers broke down, and remote working became the norm, the threat landscape rapidly changed, bringing cybersecurity to center stage for every digital organ... More

Reduce the Harm of a Data Breach With Data Security Analytics (Security Intelligence)

Key data security solutions can help discover and classify sensitive data on-premises and in the cloud. They can also monitor data activity for policy violations and detect unusual... More

As OTT Powerhouses Win Sports Rights, Will They Stop the Pirates? (GeoComply Blog)

We are seeing eye-watering deals as streaming services flex their muscles in the live sports arena. In fact, some commentators believe we have reached a tipping point for broadcast... More

Hybrid Work Here to Stay: What Does That Mean for Security? (ZDNet)

A new survey from Palo Alto Networks shows the key challenges enterprises faced as they moved to remote work and they're doing next as hybrid work models gain more acceptance.... More

Security is Everyone’s Responsibility (Arm Blueprint)

Arm's Richard Grisenthwaite discusses the landscape of cybercrime and what is being done to prevent it.... More

Splunk’s Bill Wright Breaks Down the Busy Cyber Season (MeriTalk)

Even for cybersecurity policy vets like Splunk’s Bill Wright, 2021 has taken the cake as the busiest year for Federal cybersecurity policy in the past decade – at least since 2... More

OpSec Security Introduces Stuart Chaffin, Sr. Director of Investigative Services

A certified Criminal and Civil Investigator, Chaffin has a proven track record for security management, asset protection, investigation leadership, and law enforcement operations m... More

Spend Wisely (Not Just More) to Become Cyber Resilient (Security Intelligence)

Spending on cybersecurity is hitting record highs. And that makes sense. Because of big changes in how work gets done (plus the rising cost of breaches and attacks, like ransomware... More

Extortion Payments Hit New Records as Ransomware Crisis Intensifies (Palo Alto Networks Blog)

The average ransomware payment climbed 82% since 2020 to a record $570,000 in the first half of 2021, as cybercriminals employed increasingly aggressive tactics to coerce organizat... More

Report: Cyberfraud Shifts to Gaming, Travel and Leisure (CNBC)

The report shows the overall rate of suspected online fraud attempts jumped by 16.5% worldwide compared with the same period in 2020, and U.S.-based incidents grew by a similar per... More

How to Improve Information Governance, Cybersecurity (A TransPerfect World)

Information governance and cybersecurity must become part of a company’s internal compliance program. Otherwise, boards will face much greater scrutiny, potential regulatory inve... More

Cybercriminals Manipulate IT Burnout to Launch Disruptive Attacks (Tech HQ)

Cybercriminals are now deploying advanced techniques to deliver a more targeted, sophisticated attack that distorts the digital reality, be it via compromising business communicati... More

Microsoft Announces New Ransomware Detection Features for Azure (ZDNet)

Microsoft has unveiled a new ransomware detection feature for its Azure customers that will send alerts to security teams when the system observes actions "potentially associated w... More

It’s Time to Bridge the Gap Between Security and Development (CD)

More than 80% of developers knowingly release applications with insecure code, but experts say security and development don't have to be at odds.... More

Sign up for our newsletters
* indicates required
MESA Newsletters