Cyber Security

 

When it Comes to Cybersecurity, We Need to Adapt for Now and the Future (CIO)

As we adapt to a future of remote workers, this is a critical time to ensure you have an incident response plan in place, and can adapt for an indefinite change in operational proc... More

Coronavirus Hackers Face the Wrath of the Cybersecurity Community (Verdict)

Hell hath no fury like the cybersecurity community during a pandemic. As Covid-19 continues to spread around the planet, bringing much of it to a standstill and claiming thousands ... More

Cyberthreats to Gaming Companies and Gamers (Security Intelligence)

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies... More

Working From Home: Cybersecurity Tips for Remote Workers (ZDNet)

Switching to remote working because of the coronavirus can create cybersecurity problems for employers and employees. Here are some things to watch.... More

The Internet is Drowning in COVID-19-Related Malware, Phishing Scams (Ars Technica)

Emails and websites are promising vital information about keeping safe from the coronavirus pandemic that’s sweeping the globe and threatening millions. In fact, a flood of them ... More

IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (Security Intelligence)

Global events such as the novel coronavirus (COVID-19) make all of us attractive targets for cybercriminals. Whether it’s phishing emails or new targeted scams, these tactics are... More

What Traits are Shared by Cybersecurity-Savvy Businesses? (TWA)

Defending against cyber threats is getting increasingly complicated. Hackers are using sophisticated tools and techniques while businesses struggle to evolve their security strateg... More

5 Ways Mobile Devices are the Biggest Threat to Cybersecurity (ReadWrite)

Mobile devices are vulnerable and have become a breeding ground for hackers and spammers giving them access to some company data and personal databases. Furthermore, mobile devices... More

Cybersecurity Trends to Know in 2020 (CPO)

The rapid growth of criminal software development coupled with the cybersecurity skills shortage have also contributed to the rise in cyber attacks. As such, it is more important t... More

The Dark Web: Behind the Mystery and Preserving Privacy (Verdict)

The dark web is renowned for being the leading marketplace for all kinds of dirty deals, with stolen data being among the most coveted of purchases.... More

4 Tips to Make Passwordless More Secure Than Risk Based Authentication (Forbes)

Everyone hates passwords. In today’s world of digital transformation, users are demanding more seamless experiences. But how can you make the digital experience more user centric... More

Security Guidance Fit for a Pandemic (ISE Blog)

As many of us transition to mandatory teleworking scenarios, thought pieces are popping up in every corner of the internet on how to best work from home. We wanted to take the oppo... More

In 2020, IoT Security Must Be Part of Your Threat Management Strategy (Security Intelligence)

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or ... More

Dump Your Passwords, Improve Your Security – Really (CNET)

Passwords suck. They're hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. ... More

Q&A: IBM Security Targets Cybercrime Threat (MWL)

Martin Borrett, distinguished engineer and CTO, IBM Security Europe, discusses the steps the company is taking to ensure the security of its partners and customers in the next-gene... More

Staying Resilient: Is Cybersecurity a Burden to Agile Development? (TWA)

Cybersecurity challenges are nothing new to organizations that are pretty far ahead in their digital journey. Various initiatives and technology solutions have allowed organization... More

The Rise of Cybersecurity Product Sprawl (DXC Technology Blog)

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one... More

How India is Building an Ecosystem Around Cybersecurity (Analytics India)

In light of the burgeoning digital sector in India, ambitious plans for quick transformation and rapid growth, the role of IT infrastructure is critical. At the same time, it needs... More

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More

Hacking Victims are Uncovering Cyberattacks Faster – and GDPR is the Reason Why (ZDNet)

The amount of time hackers spend inside the networks of compromised organisations before being uncovered has massively declined across Europe -- and GDPR is a key reason for the dr... More

Sign up for our newsletters
* indicates required
MESA Newsletters