Cyber Security

 

The Evolution of Enterprise Security Systems, Best Practices by Alibaba (Alibaba Cloud Blog)

For Alibaba Cloud, which provides infrastructure products, the key risk domains for cloud computing businesses include hardware, systems, networks, and user compliance. The focus a... More

4 Myths Cybersecurity Experts Want Busted (CIO Dive)

Before the coronavirus pandemic forced the workforce to work from home, employees conceded some flaws: There's a knowledge gap in security best-practices. Four in 10 employees beli... More

Why High-Profile Hacks Could Increase Amid Pandemic-Prompted Remote Work (Billboard)

Hackers are threatening to release a treasure trove of private data stolen from one of Hollywood's top talent law firms if it doesn't pay a $42 million ransom -- and experts say co... More

As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints (Dark Reading)

A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.... More

Flattening the Curve on Cybersecurity Risk After COVID-19 (Forbes)

As corporate boards and CEO’s fight the battle of their lives to keep their companies alive amongst the COVID-19 crisis, they’ve also had to stiffen their lines of defense agai... More

CISA Warnings Highlight Myriad Security Threats (Decipher)

The Cybersecurity and Infrastructure Security Agency has issued several alerts over the past week warning government agencies and other private sector organizations to be vigilant ... More

Does Your Mobile Application Hide Secrets? (Irdeto Perspective)

The COVID-19 global pandemic has forced most companies and their employees to stay home. Despite this lack of physical mobility, people are increasingly using multiple mobile devic... More

Five Ways Our Approach to Cybersecurity Could Change Post COVID-19 (Tech HQ)

The fact is, with our personal and work lives now digitized, cyber threats are one of the most real threats we face, and their scale has only magnified in a crisis which has us bot... More

Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web (Security Intelligence)

Cyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question of when, not if, and adapted security st... More

Cybersecurity Compliance Trends in a Post-Pandemic World (Forbes)

While COVID-19 may have ground most of the world to a halt, unfortunately, we can't say the same for hackers and cybercriminals. And with the majority of economists predicting a gl... More

TPN Security Experts: Global Pandemic Proves Importance of Remote Assessment Options

Just a few months ago, media and entertainment vendors could treat remote security assessments under Trusted Partner Network (TPN) guidelines as a nice-to-have option. The ongoing ... More

How to Harden OpenVPN in 2020 (ISE Blog)

Since everyone is working from home for the foreseeable future, corporate IT departments are scrambling to bolster existing VPN solutions or deploy new ones as fast as possible. On... More

Cybercriminals Timed Attacks to Spike During Peak Uncertainty About the Coronavirus (TechRepublic)

Bad actors matched their cyber attack strategy with the increasing uncertainty of the coronavirus epidemic, according to a new analysis.... More

Cybersecurity and COVID-19: The First 100 Days (Forbes)

With cybercrime accelerating as Covid-19 spreads, manufacturing and retail organisations are seeing the most attacks. Between January and March, spam and opportunistic detections i... More

As Online Shopping Grows, so Does the Risk of E-Skimming Attacks (Thrive)

E-skimming has been an online shopping threat for a long time, keeping pace with the growth of e-commerce overall. The current global crisis presents another big opportunity for ha... More

How Enterprises Can Battle Cyberattack Onslaught (CPO)

Although new solutions exist, the adoption rate has been sluggish due to inefficient and cumbersome evaluation methods. As the intensity of cyberattacks rises, enterprises and orga... More

Business Continuity and Security in a Remote Work Era (Illumio Blog)

The unprecedented social distancing measures have created a unique and somewhat unexpected challenge for many IT and risk teams. Business Continuity Planning strategies often cente... More

How to Make Cybersecurity More Approachable (Forbes)

Today, security knowledge can make or break a career. While industries have evolved from awareness to implementation and specific guidelines, there are still a lot of misconception... More

6 Things to Do After Implementing Cybersecurity AI for Alert Management (Security Intelligence)

Security teams are dealing with a stream of warnings about failed login attempts, possible phishing emails and potential malware threats, among other challenges. There are concerns... More

Increased Web Traffic, Demand for Security Solutions Boost Akamai Q1 Results (CDSA)

Stronger than expected traffic levels on Akamai’s platform and the continued strong performance of the company’s security solutions helped drive the strong results that it saw ... More

Sign up for our newsletters
* indicates required
MESA Newsletters