Cyber Security

 

A Hack the Box Walkthrough  – Resolute (ISE Blog)

First, we’ll start with a TCP scan, and if no interesting services are found, we can switch to a UDP scan to uncover more potential attack surface. I use a standard nmap command ... More

Gartner Shrinks Infosec Spending Forecast for 2020, Cloud Security Gets COVID-19 Boost (CIO Dive)

Gartner expects spending on information security to increase just 2.4% this year, down from December projections of 8.7% growth, according to the firm's analysis. Spending is expec... More

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption (Security Intelligence)

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of busine... More

Microsoft Confirms Acquisition of CyberX to Boost Security in its Azure IoT Business (TechCrunch)

Another big acquisition out of Israel this week points to how bigger tech companies are using the economic slowdown to focus on their longer-term strategies and shore up assets to ... More

Illumio Extends Zero Trust to the Endpoint (CDSA)

Illumio announced Illumio Edge, a first-of-its kind Zero Trust endpoint protection solution that dramatically reduces the risk of ransomware and malware propagating laterally throu... More

Cyberhaven Honored for Data Protection Work (CDSA)

Cyberhaven was named a 2020 Fortress Cyber Security Award winner in the Data Protection category. The company also unveiled new continuous monitoring and real-time discovery capabi... More

The Latest Mobile Security Threats and How to Prevent Them (Security Intelligence)

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VP... More

Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)

With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More

Your Small Business is Not Prepared for This Cyber Nightmare (Fast Company)

Businesses with fewer than 10 employees are less likely to have ramped up their investment in cybersecurity since pandemic lockdown orders began, according to a new report. A surve... More

Identifying Cyber Vulnerabilities During a Pandemic (TechNative)

Amid the COVID-19 outbreak, the National Crime Agency in the U.K. has identified a surge in ‘coronavirus-themed’ malicious apps, websites, phishing emails and messages that see... More

Multifactor Authentication: The Next Battleground (Security Intelligence)

X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where imple... More

How Threat Actors are Adapting to the Cloud (Security Intelligence)

With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data t... More

It’s Time to Take a Fresh Look at Zero Trust (Security Intelligence)

With millions of employees across the U.S. experimenting with work-at-home scenarios for the first time, many organizations are taking a fresh look at a Zero Trust security strateg... More

Cybersecurity in the 5G Era: Nightmare or Opportunity? (Irdeto Perspective)

Cybersecurity is a bit of a conversation killer. Despite a near-universal increase in our devotion to connected devices – and a corresponding increase in our risk of attack – m... More

Why Remote Working is Making it Harder for You to Spot Phony Emails (ZDNet)

The number of phishing attacks and other email-based cyber-criminal campaigns continues to rise, with most organisations having witnessed an increase over the past year – but des... More

The Next Battle in the Cyber Arms Race (TechRadar)

A crucial response to the onset of increasingly sophisticated and novel attacks has been AI-powered defenses, a development driven by the philosophy that information about yesterda... More

The Unaddressed Gap in Cybersecurity: Human Performance (MIT Sloan)

Without addressing this issue of human performance, a vicious cycle perpetuates. As companies bring on board new technologies — each one potentially addressing an emerging threat... More

Report: 60% of Organizations to Suffer Email Borne Attacks (CISO)

A new survey revealed that nearly 60% of organizations believe that they will likely suffer from an email-borne attack in the coming year. And 77% of respondents stated that they a... More

How Cybersecurity Leaders Can Chart the Seas of Business Communication (Security Intelligence)

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages acros... More

Hurricanes, Global Tensions Shape Forrester’s 9 Security Priorities for 2020 (CIO Dive)

Security threats include bad actors exploiting flaws in home networks to climate-change induced wildfires that can put key data centers in harm's way.... More

Sign up for our newsletters
* indicates required
MESA Newsletters