Cyber Security

 

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might (Security Intelligence)

With the deployment of 5G on the way — which will spark an explosion of internet of things devices everywhere — today’s Big Data era may end up as a molehill in terms of data... More

SAS Fortifies Cybersecurity Solution With ‘White Box’ AI (CDSA)

Last year's ceaseless data breaches involving once-trusted brands underscore the urgent need for organizations to reassess and reinforce their information security. SAS Cybersecuri... More

IBM X-Force Red Launches New Service for Blockchain Security Testing (CDSA)

IBM Security's team of offensive security experts, X-Force Red, announced the launch of a new blockchain testing service to help identify weaknesses and strengthen security of a wi... More

A CEO Cheat Sheet for the Cybersecurity Big One (Forbes)

Breaches have become so commonplace they feel like they've become an accepted part of business as usual, but complacency is a mistake. In the Conference Board's 2019 C-Suite survey... More

Cybersecurity is Putting Customer Trust at the Center of Competition (HBR)

If you’re selling a product, you’re now selling trust. That’s thanks to two conflicting trends. One is our increasing reliance on software across nearly every dimension of ou... More

Continuous Risk, Security, Compliance for Cybersecurity Posture Management: A Unified Approach (Forbes)

Today’s risk, security and compliance solutions are fragmented, requiring different approaches or even totally different deployments for on-premise, the cloud, containers, and en... More

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

Pay TV Can’t Leave its Head in the Clouds When it Comes to Content Security (NAGRA Blog)

Everyone from Hollywood studios to live sports broadcasters to pay-TV service providers must now leverage the power of OTT and cloud technologies to distribute content securely ove... More

Cybercriminals Make $3.25B+ a Year Using Social Media (SiliconANGLE)

As bad as content such as anti-vaccine material on Facebook Inc. or alleged suicide instruction videos on YouTube look, a new report out today details an even more nefarious use of... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

How AI-Based Cheating Tools Have Forced Video Game Companies to Innovate Security (Analytics India)

While artificial intelligence has entered the mainstream in a big way and found applications in almost every walk of life, there is one field where it has been widely used for many... More

Chatbot Implementation: Best Practice Tips from Avanade (IA)

Carlsberg is the perfect example of a traditional organisation embracing the digital. As part of this digital transformation drive, Avanade was also employed to develop and deliver... More

How Gamification Can Boost Cybersecurity (Information Age)

Using techniques derived from game-playing helps to upskill your staff so they can better cope with cyber threats. Here’s how it can be done.... More

Cyberpreneurship, a New Age Tool in Cybersecurity (Entrepreneur)

Cyberpreneruship has boomed since the past half decade, the ripples of which are only getting louder as we speak, reaching out to cover virtually every avenue existing on the Inter... More

ISE: Leading Password Managers are Insecure (CBR)

Leading password managers are rife with insecurities when it comes to memory management, failing to scrub data from local memory that could be used to expose their bank of user pas... More

NCC Group, University of Surrey Launch Cybersecurity Research Partnership (IML)

A partnership has been set up by Manchester-headquartered NCC Group and the University of Surrey in a bid to advance security research within the space industry. Establishing a cen... More

Why Blockchain May be Blockchain’s Best Cybersecurity Option (Network World)

With new and emerging security threats to blockchain projects, it's time to consider building decentralized security applications.... More

Organizations Continue to Fail at IoT Security, and the Consequences are Growing (Security Intelligence)

The internet of things (IoT) is taking over the world — or, at least, it seems that way. According to Gartner, we can expect more than 20 billion connected IoT devices by 2020, u... More

Why Cybersecurity Education Matters (ITProPortal)

The shortage of qualified cybersecurity personnel is visibly apparent with the number of unfilled cybersecurity roles on the rise.... More

Five Cybersecurity Trends to Watch for in 2019 (Forbes)

4. User Awareness. Businesses will find it critical to keep their eyes peeled in 2019 for any potential risk that can come from their own users. This may include potential harm ari... More

Sign up for our newsletters
* indicates required
MESA Newsletters