Cyber Security

 

Security Guidance Fit for a Pandemic (ISE Blog)

As many of us transition to mandatory teleworking scenarios, thought pieces are popping up in every corner of the internet on how to best work from home. We wanted to take the oppo... More

In 2020, IoT Security Must Be Part of Your Threat Management Strategy (Security Intelligence)

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or ... More

Dump Your Passwords, Improve Your Security – Really (CNET)

Passwords suck. They're hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. ... More

Q&A: IBM Security Targets Cybercrime Threat (MWL)

Martin Borrett, distinguished engineer and CTO, IBM Security Europe, discusses the steps the company is taking to ensure the security of its partners and customers in the next-gene... More

Staying Resilient: Is Cybersecurity a Burden to Agile Development? (TWA)

Cybersecurity challenges are nothing new to organizations that are pretty far ahead in their digital journey. Various initiatives and technology solutions have allowed organization... More

The Rise of Cybersecurity Product Sprawl (DXC Technology Blog)

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one... More

How India is Building an Ecosystem Around Cybersecurity (Analytics India)

In light of the burgeoning digital sector in India, ambitious plans for quick transformation and rapid growth, the role of IT infrastructure is critical. At the same time, it needs... More

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More

Hacking Victims are Uncovering Cyberattacks Faster – and GDPR is the Reason Why (ZDNet)

The amount of time hackers spend inside the networks of compromised organisations before being uncovered has massively declined across Europe -- and GDPR is a key reason for the dr... More

We Need More Than Security Awareness to Combat Insider Threats (SecurityIntelligence)

There are plenty who would say that issues around malware and similar threats are due to people being stubborn, lazy or ignorant of how much damage a security incident can cause. M... More

Warning Over ‘Hidden Apps’ as Mobile Malware Attacks Increase – and Get Sneakier (ZDNet)

Mobile malware attacks are becoming more common as cyber criminals increasingly turn their attention towards smartphones – and they're ensuring that malicious activity is harder ... More

Why Threat Intelligence Gathering Can Be a Legal Minefield (Dark Reading)

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground on... More

Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)

Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More

AI Gives Web Hosting Industry Crucial Edge Over Cyber Criminals (SDC)

The web hosting industry has undergone a tremendous transformation in recent years. One of the biggest trends is the growing reliance on artificial intelligence. AI has helped web ... More

How Will AI-Generated Deepfake Content Impact Your Business? (Avanade Insight)

The challenge with deepfake technology is that bad actors have an outsized advantage and there are no solid technology solutions in place to address the growing threat. In AI circ... More

Making Cloud Security a Team Sport (Security Intelligence)

While most large enterprises are moving to the cloud in some form, the path is never as direct as chief information officers and chief information security officers (CISOs) might l... More

FBI: The Most Perpetrated Cybercrime is Not What You Think (PCMag)

A dive into the reported Cybercrime stats show ransomware and phishing are not as big a threat as extortion, data breaches, and simply not getting what you paid for.... More

You Can’t Automate the Entire Cybersecurity Function – Yet (TechHQ)

Automation is 'not a quick, fix-all solution,' says the Ponemon Institute. Cybersecurity needs humans.... More

Malvertising in Govt, Enterprise Targets Old Software, Macs (BleepingComputer)

A new report on malicious advertising underscores the importance of using modern web browsers and making sure your operating system is up to date with the latest security updates t... More

Do We Have to Trade Convenience for Good Cybersecurity? (TWA)

One of the biggest challenges for companies and enterprises today is information network security or cybersecurity. Today, companies are ceaseless in ensuring their fight against d... More

Sign up for our newsletters
* indicates required
MESA Newsletters