Cyber Security

 

ISE: Leading Password Managers are Insecure (CBR)

Leading password managers are rife with insecurities when it comes to memory management, failing to scrub data from local memory that could be used to expose their bank of user pas... More

NCC Group, University of Surrey Launch Cybersecurity Research Partnership (IML)

A partnership has been set up by Manchester-headquartered NCC Group and the University of Surrey in a bid to advance security research within the space industry. Establishing a cen... More

Why Blockchain May be Blockchain’s Best Cybersecurity Option (Network World)

With new and emerging security threats to blockchain projects, it's time to consider building decentralized security applications.... More

Organizations Continue to Fail at IoT Security, and the Consequences are Growing (Security Intelligence)

The internet of things (IoT) is taking over the world — or, at least, it seems that way. According to Gartner, we can expect more than 20 billion connected IoT devices by 2020, u... More

Why Cybersecurity Education Matters (ITProPortal)

The shortage of qualified cybersecurity personnel is visibly apparent with the number of unfilled cybersecurity roles on the rise.... More

Five Cybersecurity Trends to Watch for in 2019 (Forbes)

4. User Awareness. Businesses will find it critical to keep their eyes peeled in 2019 for any potential risk that can come from their own users. This may include potential harm ari... More

When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

2019 Security Spending Outlook (Dark Reading)

With data breach numbers continuing to creep upward and digital transformation efforts exposing enterprises to new cybersecurity risks across numerous business dimensions, it's no ... More

Break Through Cybersecurity Complexity With New Rules, Not More Tools (Security Intelligence)

Let’s be frank: Chief information security officers and security professionals all know cybersecurity complexity is a major challenge in today’s threat landscape. Other folks i... More

Segmented Security Startup Illumio Raises $65M in Series E Round (TechCrunch)

Illumio has raised $65 million in its latest round of funding led by J.P. Morgan Asset Management, the security startup has confirmed. The data-center monitoring and cloud security... More

Improving Cybersecurity Means Taking More Care with What We Digitize (HBR)

Security researcher Troy Hunt recently discovered one of the largest online troves of leaked personal information in history. Hunt’s discovery stresses a point that’s been evid... More

Can AI Become Our New Cybersecurity Sheriff? (Forbes)

Deploying AI for cybersecurity solutions will help protect organizations from existing cyber threats and help identify newer malware types too. Additionally, AI-powered cybersecuri... More

Two Cybersecurity Myths You Need to Forget Right Now, if You Want to Stop the Hackers (ZDNet)

Two myths stand in the way of boards understanding the threats posed by cyberattacks and ensuring their businesses can be safe against cyber criminals and hackers. First, too many ... More

ZOO Digital Joins the Trusted Partner Network (CDSA)

ZOO Digital has joined the Trusted Partner Network, the new international standard for content security. In participating in the TPN, ZOO joins an elite group of localization vendo... More

Cybersecurity Starts with Access Control (Forbes)

Humans are often pegged as the weakest link in cybersecurity -- and to a great extent, that’s true. While training employees to think like hackers can certainly make your company... More

The $5.2T Price Tag of Cybercrime (Entrepreneur)

Trust in the digital economy is eroding as the number of cybercrime incidents are increasing by the day. From January to October 2018, there were 67 significant cyber incidents wor... More

The Cloud’s Weakest Security Links Aren’t Where You’re Looking (InfoWorld)

You pride yourself on your cloud computing security strategy and tool stack. Indeed, your system made up of many security solutions is both proactive, and self-updating. So, you’... More

Why Cybersecurity Must Be a Top Priority for Small, Midsize Businesses (Dark Reading)

The big corporations may grab the headlines, but America's SMBs have the most to lose in the aftermath of a data breach.... More

Drive Innovation with Your Security Strategy in 2019 (Security Intelligence)

Most organizations have announced their intent to be more innovative in 2019 — to make changes that will make them stronger, faster and better. But innovation as an end result re... More

Old Password Habits Die Hard … If They Ever Die at All (DXC Technology Blog)

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to ... More

Sign up for our newsletters
* indicates required
MESA Newsletters