Cyber Security
Akamai Acquires Inverse, Boosts Zero Trust Security Platform
Edge platform and security specialist Akamai has acquired Montreal-based Inverse, a company that identifies devices and expected behaviors to better secure the Internet of Things (... More
ZTE Integrates Irdeto Trusted Home Solution to Routers Globally
Irdeto and ZTE expand their partnership, providing operators opportunities to boost revenue and increase customer satisfaction. (more…)... More
EP’s Mazor Talks CISO Role, Securing ‘Work From Anywhere’ (BIS)
Martin Mazor of Entertainment Partners discusses the vital role of identity in his enterprise’s unique business.... More
FBI: Watch Out for Spoofed Websites With Deceptive URLs (Security Intelligence)
Employers can help their users to not fall for a spoofed domain such as the ones in the FBI announcement by investing in ongoing security awareness training for their entire workfo... More
How to Translate Threats and Risk to C-Suite (CD)
When communicating with the C-suite or shareholders, CISOs have to speak equal parts security and bottom line.... More
How to Make Cybersecurity a Top Priority for Boards, CFOs (HBR)
If boards and CFOs learned anything in 2020, it was to expect the unexpected. But to be truly effective, they need to fully understand the risks and view cybersecurity as foundatio... More
Interview With a Russian Cybercriminal (DarkReading)
A LockBit ransomware operator shared with researchers why he became involved in cybercrime, how he chooses victims, and what's in his toolbox.... More
Women Primed to Fill Cybersecurity Talent Gap (FT)
Pandemic-led jump in homeworking heightens need for more cyber security analysts.... More
How to Secure the Cloud as a Universal Production Resource? (2030 Vision Blog)
The complexity of delivering security to cloud users far beyond the perimeters of any facility needs a new approach to security.... More
Palo Alto Networks Pumps Up Prisma Cloud (SDxCentral)
Palo Alto Networks updated its Prisma Cloud security product to provide more options for customers securing their cloud native deployments. The product now has the ability for Pris... More
Cybersecurity is Not (Just) a Tech Problem (HBR)
Remote work during the pandemic has meant that organizations had to quickly ramp up their cybersecurity efforts. But securing remote work isn’t just the job of the IT team: Ultim... More
Cyberthreat Trends in the Remote Work Landscape (CD)
With more workers logging in from home, companies face new cybersecurity challenges and opportunities.... More
Researchers Identify Enterprise Attack Using New Ransomware (Security Intelligence)
A new ransomware, Babuk Locker, has struck five different companies globally, earning the dubious title of first new enterprise ransomware strain of 2021. The threat actors behind ... More
Cybersecurity Investments Will Increase Up to 10% in 2021 (HNS)
The overall cybersecurity market value is expected to reach US$60.2 billion in 2021, covering shipments of endpoint security, network security, web and email security, data securit... More
Report: Worldwide Cybersecurity Spending to Increase 10% in 2021 (ASB)
With the range of cyber-threats set to broaden and the frequency of attacks unlikely to subside in 2021, the cybersecurity industry seems intent on offsetting such challenges, with... More
2021 Trends in Cybersecurity (CPO)
The future of security lies in a proactive approach. A proactive security approach is designed to prevent attacks rather than react after an attack has happened.... More
Practical Security Steps to Take Now (Avanade Insights)
While it will take historians generations to analyze the full impact of the current global pandemic, when seen through the eyes of a CIO or CISO today, we can already assess how it... More
IBM Security Technology Added for New Telecom FiberCorp Solutions
Telecom FiberCorp will offer two IBM Security products for the first time as part of its cybersecurity solutions to help clients protect and secure the access to confidential infor... More
Has COVID-19 Killed the Password? (Tech Monitor)
The pandemic has shone a spotlight on the weaknesses of the most common form of digital authentication.... More
For Attackers, Home is Where the Hideout is (Security Intelligence)
Vulnerability management programs can detect known vulnerabilities such as a lack of antivirus software and outdated operating systems.... More