Cyber Security

 

Akamai Acquires Inverse, Boosts Zero Trust Security Platform

Edge platform and security specialist Akamai has acquired Montreal-based Inverse, a company that identifies devices and expected behaviors to better secure the Internet of Things (... More

ZTE Integrates Irdeto Trusted Home Solution to Routers Globally

Irdeto and ZTE expand their partnership, providing operators opportunities to boost revenue and increase customer satisfaction. (more…)... More

EP’s Mazor Talks CISO Role, Securing ‘Work From Anywhere’ (BIS)

Martin Mazor of Entertainment Partners discusses the vital role of identity in his enterprise’s unique business.... More

FBI: Watch Out for Spoofed Websites With Deceptive URLs (Security Intelligence)

Employers can help their users to not fall for a spoofed domain such as the ones in the FBI announcement by investing in ongoing security awareness training for their entire workfo... More

How to Translate Threats and Risk to C-Suite (CD)

When communicating with the C-suite or shareholders, CISOs have to speak equal parts security and bottom line.... More

How to Make Cybersecurity a Top Priority for Boards, CFOs (HBR)

If boards and CFOs learned anything in 2020, it was to expect the unexpected. But to be truly effective, they need to fully understand the risks and view cybersecurity as foundatio... More

Interview With a Russian Cybercriminal (DarkReading)

A LockBit ransomware operator shared with researchers why he became involved in cybercrime, how he chooses victims, and what's in his toolbox.... More

Women Primed to Fill Cybersecurity Talent Gap (FT)

Pandemic-led jump in homeworking heightens need for more cyber security analysts.... More

How to Secure the Cloud as a Universal Production Resource? (2030 Vision Blog)

The complexity of delivering security to cloud users far beyond the perimeters of any facility needs a new approach to security.... More

Palo Alto Networks Pumps Up Prisma Cloud (SDxCentral)

Palo Alto Networks updated its Prisma Cloud security product to provide more options for customers securing their cloud native deployments. The product now has the ability for Pris... More

Cybersecurity is Not (Just) a Tech Problem (HBR)

Remote work during the pandemic has meant that organizations had to quickly ramp up their cybersecurity efforts. But securing remote work isn’t just the job of the IT team: Ultim... More

Cyberthreat Trends in the Remote Work Landscape (CD)

With more workers logging in from home, companies face new cybersecurity challenges and opportunities.... More

Researchers Identify Enterprise Attack Using New Ransomware (Security Intelligence)

A new ransomware, Babuk Locker, has struck five different companies globally, earning the dubious title of first new enterprise ransomware strain of 2021. The threat actors behind ... More

Cybersecurity Investments Will Increase Up to 10% in 2021 (HNS)

The overall cybersecurity market value is expected to reach US$60.2 billion in 2021, covering shipments of endpoint security, network security, web and email security, data securit... More

Report: Worldwide Cybersecurity Spending to Increase 10% in 2021 (ASB)

With the range of cyber-threats set to broaden and the frequency of attacks unlikely to subside in 2021, the cybersecurity industry seems intent on offsetting such challenges, with... More

2021 Trends in Cybersecurity (CPO)

The future of security lies in a proactive approach. A proactive security approach is designed to prevent attacks rather than react after an attack has happened.... More

Practical Security Steps to Take Now (Avanade Insights)

While it will take historians generations to analyze the full impact of the current global pandemic, when seen through the eyes of a CIO or CISO today, we can already assess how it... More

IBM Security Technology Added for New Telecom FiberCorp Solutions

Telecom FiberCorp will offer two IBM Security products for the first time as part of its cybersecurity solutions to help clients protect and secure the access to confidential infor... More

Has COVID-19 Killed the Password? (Tech Monitor)

The pandemic has shone a spotlight on the weaknesses of the most common form of digital authentication.... More

For Attackers, Home is Where the Hideout is (Security Intelligence)

Vulnerability management programs can detect known vulnerabilities such as a lack of antivirus software and outdated operating systems.... More

Sign up for our newsletters
* indicates required
MESA Newsletters