Cyber Security

 

How to Make Personalized Marketing Effective With Consumer Identity Programs (Security Intelligence)

Everyone is fighting for the attention of potential customers. It’s the work you’ve done; the creative energy expended by your team; and the amount of time your group spent jus... More

Why Organizations Need to Practice Situational Awareness (Thrive)

Cybersecurity breaches almost always result from the accumulation of multiple vulnerabilities over time — not from a single incident.... More

Key Cybersecurity Trends to Look Out for in 2021 (IA)

Greg Day, vice-president and chief security officer, EMEA at Palo Alto Networks, discusses the key cyber security trends that are set to emerge in 2021... More

5 Things You Need to Do to Stop Yourself Getting Hacked in 2021 (Wired)

There are two big reasons why people get hacked. Flaws in software and flaws in human behavior. While there’s not much you can do yourself about coding vulnerabilities, you can c... More

Security Management: Why Companies Need a Unified Cloud Platform (Security Intelligence)

We must adapt the way we secure data to today’s needs. Working from home has increased, forcing entities and their employees to rely more on virtual private networks (VPNs), work... More

Six Cybersecurity Trends Heading Our Way in 2021 (Tech HQ)

If we've learned anything about cyberattacks in 2020, it's that nothing is off-limits and everything is fair game.... More

How Regulation is Impacting 5G Security in Europe (Palo Alto Networks Blog)

A growing focus on 5G security in Europe suggests that cybersecurity must be embraced in the design phase of future mobile architectures.... More

Improving Security at Checkout is Key to Growing eCommerce Sales (Forbes)

Two highlights of the new study: 37% of online shoppers trust Amazon, E-Bay and Etsy to protect them from online fraud versus 5% trusting independent online retailers; False declin... More

5 Tips for Fostering Cybersecurity Talent (Tech HQ)

In this skills emergency, organizations can easily get ambushed in the ‘make or buy’ debate. But hiring new talent is just part of the solution — once people are in the role,... More

10 Ways to Protect Against DDoS Attacks (Akamai Blog)

Over the years, bad actors have grown more and more savvy, launching increasingly sophisticated DDoS attacks to disrupt businesses, obfuscate other types of attacks, or extort rans... More

Cybersecurity Rankings Reveal Leading Global Cyber Powers (Tech Monitor)

As businesses struggle to square growing cyber risk with limited budgets, national cyber strategy is becoming increasingly important.... More

Centralizing Data Encryption Keys With Key Management Standards (Security Intelligence)

Many people already know data encryption can help secure sensitive business data. But, because organizations have adopted it so widely, IT and security teams now must manage growin... More

Irdeto Honored for App Watch Solution, TraceMark for Distribution

Irdeto won in two categories at the VideoTech Innovation Awards 2020, spotlighting both their App Watch product and Irdeto TraceMark for Distribution. (more…)... More

4 Cyber Threats Coming to an e-Store Near You (Tech HQ)

As a surge in e-commerce and cybercrime converge for a seasonal crescendo, here are three cyber-threats retailers should be worried about.... More

Cybersecurity Tips From Unit 42 for the 2020 Holiday Shopping Season (Palo Alto Networks Blog)

With an extended holiday shopping season – one that will be predominantly online due to COVID-19 – come more opportunities for cybercriminals to target consumers with a variety... More

IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have (Security Intelligence)

As the chief information security officer (CISO) for IBM, I’m often asked by peers and colleagues, “What do you think of Zero Trust?” Or, perhaps more often, “What strategi... More

Irdeto Launches Keys & Credentials for ISP Routers

Keys & Credentials for Routers is a fully managed service that lays the security foundation and ensures recoverability and improves resilience for both CPE and the ISP infrastructu... More

The Looming Threat of AI-Powered Cyberattacks (Tech HQ)

AI and machine learning are making things convenient for internet users but also for hackers who use AI to orchestrate multiple cyber-attacks.... More

Five Cyberthreats You Need to Watch Out for (Raconteur)

Cybersecurity is an ever-changing game, requiring information security professionals to keep abreast of the evolving threat landscape. Here are five emerging risks to keep an eye o... More

5 Lessons We Learned From Our Ransomware Attack (HBR)

Time is of the essence in a ransomware attack, as one of the real impacts is downtime. The average attack takes critical systems down for 16 days, according to Emsisoft, which pred... More

Sign up for our newsletters
* indicates required
MESA Newsletters