Cyber Security

 

Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More

DXC Technology Extends Service Management, Security Operations Capabilities With Acquisition of Syscom (CDSA)

DXC Technology announced the acquisition of Syscom, a leading ServiceNow partner, to extend the reach and scale of its security operations and service management capabilities. The ... More

EY Report: Cybersecurity Concerns Prevent Companies From Adopting New Technology (UK Tech)

A new report published by EY shows that over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster.... More

Has Your Business Considered Biometric Security? (Tech HQ)

Biometric security is often hailed an immutable solution in an age under the constant shadow of cybersecurity risks. A combination of technology and the verification of unique, phy... More

Securing and Protecting Your IoT Network (TechGenix)

Even the slightest misconfiguration or poor security practices can serve as a point of entry for cyberattacks, security breaches, and data theft. Since IoT is a network of connecte... More

Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)

IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More

Cybersecurity: 3 Ways CXOs Can Guard Against Insider Threats (TechWire Asia)

Insider threats have always posed quite a challenge to cybersecurity specialists looking to defend a company’s data and infrastructure. In the digital world, while external attac... More

Cybersecurity and Economic Uncertainty (Tech HQ)

Can society live with constantly compromised data? It’s a valid question because there’s every indication that we are doing so currently, and will continue to do so.... More

Identity Management is Coming to the Internet of Things (DXC Technology Blog)

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonab... More

Phishers Play on Emotions to Fool Victims (Decipher)

Phishing has proven to be one of the more difficult security problems to solve, and new research from Google shows that it’s not just because humans are gullible. It turns out th... More

Package Delivery! Cybercriminals at Your Doorstep (Security Intelligence)

IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or someone�... More

AI in Cybersecurity Works, But Watch the Hype (Tech HQ)

AI and automation technologies can help businesses cope with a proliferation of cyberthreats— but watch out for the hype.... More

NAGRA’s Simon Trudelle Talks Content Protection, OTT, Data (Digital TV Europe)

"The next big thing is simply thinking beyond just content protection, to scalable service protection. This means taking a holistic approach to service protection – one that scal... More

Preparing for Quantum Computing’s Devastating Impact on Cybersecurity (Verdict)

Quantum computers are often considered the next great advance in the computing space, with potential benefits for chemistry, artificial intelligence, cryptography and a host of oth... More

Industrial Cyberattacks See Huge Rise (IT Pro Portal)

Nowadays, hackers are more interested in wreaking havoc, rather than just creating malware that’s going to steal data or conduct some form of espionage. This is according to IBM�... More

5 Biggest Cybersecurity Updates From Black Hat 2019 You Should Know (Analytics India)

The biggest event for hackers concluded in Las Vegas last week. During the conference, there were many revelations that threw light on the cybersecurity space and some of them were... More

NCC Group Launches Self-Service Cloud Compliance Platform (CDSA)

NCC Group has debuted "Scout," a new client self-service platform for public cloud configuration checking. The agnostic tool allows companies to monitor configuration of their AWS,... More

Microsoft Launches Azure Security Lab, Doubles Top Bug Bounty to $40K (VentureBeat)

Microsoft announced the Azure Security Lab, a sandbox-like environment for security researchers to test its cloud security. The company also doubled the top Azure bug bounty to $40... More

Edgescan Employees Talk Cybersecurity, New Career Opportunities (Infosecurity)

Ireland has been pushing to become a Cyber Security Centre of Excellence, but this can only be achieved with the right talent. Two recent graduates landed jobs with local vulnerabi... More

Integrating IoT With Blockchain: A Trust and Security Game Changer (IA)

In business today, gathering data and exploiting it is the name of the game. Data should be driving decisions and digital transformation. But, how can organisations tap into the in... More

Sign up for our newsletters
* indicates required
MESA Newsletters