Cyber Security
Convergent Completes Cloud and Application Security Assessment for ftrack
Convergent and ftrack announced the successful completion of ftrack’s cloud and application security assessment for its Academy Award-honoured production tracking and media revie... More
Why Netflix’s Password Sharing Crackdown Makes Sense in Today’s Streaming World (Forbes)
The hearts of millions of TV-watching young adults likely fluttered just a bit this week when they heard Netflix may start cracking down on password sharing between people who don�... More
What Makes Ransomware a Constant Enterprise Pain Point (CD)
Threat groups mimic and manipulate the tactics, techniques and procedures of other groups, making ransomware attacks more difficult to prevent.... More
Why the Demand for Application Development Security Skills is Exploding (Security Intelligence)
Application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill ... More
How Multi-Source Location Data Can Secure Big-Ticket Events (GeoGuard Blog)
Did you know 51% of sports fans watch pirate content at least once a month? And that’s just the armchair pirates during the regular season. What about highly anticipated prize fi... More
Did COVID-19 Usher in Cybercrime’s Golden Age? (SDxCentral)
“The pandemic was the heyday that attackers were looking for,” said Limor Kessem, executive security advisor at IBM Security. “It ushered in a period of attracting people to ... More
How Do Companies Assess Risk? It’s a System-by-System Question (Cybersecurity Dive)
Every piece of technology is vulnerable to threat actors, but each organization and cybersecurity team decides which software and technology adds risk to its business operations.... More
Why the Ability to Predict Cybersecurity Threats Matter (TechHQ)
Identifying risks ahead of time, blocking any threats before they can adversely affect your business is extremely important.... More
Why Cybersecurity Risk Management Needs to Keep Evolving (Security Intelligence)
The phrase ‘future-proof’ is seductive. We want to believe technology prepares us for the future. But with threat actors and developers in an arms race to breach and protect, c... More
These Hackers Sell Network Logins to the Highest Bidder – And Ransomware Gangs are Buying (ZDNet)
A growing class of cyber criminals are playing an important role on underground marketplaces by breaching corporate networks and selling access to the highest bidder to exploit how... More
The Emergence of the Personalized Attack Chain (TechNative)
Expect 2021 to be the year cyber attacks get personal.... More
Cybercrime Groups are Selling Their Hacking Skills (Some Countries are Buying) (ZDNet)
Nation-state hacking groups don't need to do the work themselves anymore: they can hire criminal gangs to breach targets for them - with the added bonus that it's harder to trace t... More
Palo Alto Networks Completes Acquisition of Bridgecrew
The acquisition will enable "shift left" security, with Prisma Cloud becoming the first cloud security platform to deliver security across the full application lifecycle. (more&hel... More
The Uncertainty of Cybersecurity Hiring (SI)
Cybersecurity hiring is going through a weird phase. The pandemic, the remote work movement, budget changes and the rising aggression and refinement of cyber attacks are all major ... More
Deepfaking It: The New Cybersecurity Frontier (Raconteur)
From impersonating a top executive to opening money-laundering bank accounts, deepfake fraud is becoming a growing problem and poses new challenges.... More
Three Questions Every CISO Should Ask When Building an Insider Risk Program (Code42 Blog)
Why insider risk management requires different people, process and technology.... More
How a CISO’s Executive Role Has Changed (Security Intelligence)
Now that CISOs have greater access, directors and other C-suite members are more willing to see that their domain isn’t a separate entity but needs to be part of overall business... More
Cybersecurity and Hybrid Work: What CISOs Should Know (CDO Trends)
As the concept continues to become the norm for many this 2021, organizations must act with utmost urgency to address the emerging cybersecurity and risk challenges associated with... More
New BuyDRM Paper Touts Multi-Pronged DRM Strategy
Digital rights management (DRM) technology and content security provider BuyDRM has debuted a new white paper that covers all corners of the technology, and highlights why a multi-... More
Code42 Expects Security Business to Double in 2021
Company achieved triple-digit growth in 2020, propelled by product launches, strategic security partnerships, and authorization in federal market. (more…)... More