Cyber Security

 

MEGOGO Selects ContentArmor to Strengthen Protection Against Online Piracy of PVOD Service

MEGOGO, the largest media service in Eastern Europe for streaming videos, audio and TV channels online and ContentArmor, a leading forensic watermarking vendor, announced that they... More

Cybersecurity Services Market to be Worth $192.7B (Infosecurity)

Factors expected to drive the growth of the market size include the predicted continuance of cybersecurity breaches impacting enterprises and individuals and feeding the need to ta... More

Palo Alto Networks: As Cloud Security Threats Skyrocket, Automation Can Help (SDX Central)

Palo Alto Networks’ biannual Unit 42 Cloud Threat Report found that the COVID-19 pandemic, and related shift to remote work, sent cloud security risks through the roof. While tha... More

Top 10 Ways Cybercrooks are Targeting Your Data In 2021 (Forbes)

Digital transformation isn’t just for the legitimate IT world. Just as corporations and government agencies are constantly evolving their IT infrastructure to embrace the newest ... More

COVID-Related Scams are Still on the Rise (IT Pro Portal)

As the world moves into the next stage of the Covid-19 pandemic, cybercriminals are following close behind.... More

When Companies Fail to Pay, Ransomware Gangs Email Their Customers (PC Mag)

Ransomware gangs have a pretty easy time of it already. They hack into a company server, encrypt all their data, demand payment, and wait. But what if the victim drags their feet o... More

3 Reasons Cyberattacks are Increasing – and How Zero Trust Can Help (Security Intelligence)

Without a zero trust framework, businesses can’t ensure that their employees are following office common sense rules in the process of connecting these new devices to the corpora... More

Code42, Okta Partner to Accelerate the Right Response During Insider Risk Investigations

Code42 has integrated its IncydrTM data risk detection and response product with Okta Identity Cloud, the leading user identity management solution. The integration combines Code42... More

Cookie Hijacking: More Dangerous Than it Sounds (Security Intelligence)

Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack... More

5 Key Ways CISOs Can Accelerate the Business (Forbes)

Today's chief information security officers has to weigh in on board-level decisions that affect the future of the business. A CISO's business acumen has become just as important a... More

More Budget Means More Detection (Dark Reading)

Companies that spend the smallest share of their IT budget on security see fewer threats, but that's not good news.... More

Companies Pay Out Hundreds of Millions in Ransomware Attacks (CNBC)

Video: CNBC’s Eamon Javers reports on hackers who hold companies’ data for ransom and the people who negotiate with them.... More

DISH Selects Palo Alto Networks to Help Secure 5G Network

DISH taps Palo Alto Networks to assist with 5G container security, secure network slicing, real-time threat correlation and dynamic security enforcement. (more…)... More

How CISOs Can Improve Security on a Shoestring (Forbes)

As the CISO of an organization, your responsibility is to anticipate the change in budget and still find ways to improve the security posture of your program. There are many tools ... More

Tomorrow’s Cyber Workforce has Security Skills Built-In – That Could Limit Businesses (Cybersecurity Dive)

Cybersecurity truths: The talent pool is growing but not fast enough and there will always be a variety of paths that lead to the same place.... More

Top Takeaways From the Data Exposure Report Vol. II (Code42 Blog)

Organizations are failing to protect themselves from Insider Risk. Despite a massive investment in tools and programs that categorize and block data with tools like Data Loss Prev... More

5 Cloud Security Must-Haves in 2021 (Security Intelligence)

Organizations undertaking the move to the cloud face a blizzard of sometimes confusing buzzwords. There’s hybrid cloud, multicloud, digital transformation, microservices and so m... More

Malware Hidden in Game Cheats, Mods Used to Target Gamers (Bleeping Computer)

Threat actors target gamers with backdoored game tweaks and cheats hiding malware capable of stealing information from their systems after infection.... More

Women in Cybersecurity: Why Diversity Matters (Security Intelligence)

Many women were among the first programmers who worked on the Electronic Numerical Integrator and Computer program at the University of Pennsylvania, calculating weapons trajectori... More

INTRUSION CEO Jack Blount Featured on ‘In Depth Series’ With Host Laurence Fishburne

Blount discussed the cybersecurity landscape and how new innovations based on Artificial Intelligence are needed to effectively combat the well-funded and well-organized adversarie... More

Sign up for our newsletters
* indicates required
MESA Newsletters