Cyber Security

 

Retail Cybersecurity: Black Friday and Cyber Monday Are Upon Us (Security Intelligence)

In the U.S., the post-Thanksgiving shopping blitz of Black Friday often serves as a make-or-break event for many retailers. Indeed, Black Friday is the day when retailers start to ... More

The Encryption Conundrum: Should Tech Compromise or Double Down? (The Register)

Silicon Valley should work with the US government in Washington to arrive at a solution that gives law enforcement access to encrypted comms, but that respects individual privacy. ... More

Congress Explores How to Bolster IoT Cybersecurity (BankInfoSecurity)

What's needed to bolster the security of internet of things devices to help prevent cyberattacks, such as the October botnet-driven distributed denial-of-service attack on web se... More

How IBM’s Watson will Change Cybersecurity (InfoWorld)

IBM captured our imaginations when it unveiled Watson, the artificial intelligence computer capable of playing—and winning—the "Jeopardy" game show. Since then, Big Blue has be... More

Weekend Vulnerability and Patch Report, Nov. 20, 2016 (Citadel Information Group)

Important Security Updates Foxit Reader: Foxit has released version 8.1.1.1115 of its Reader to fix six highly critical vulnerabilities. Updates are available on Foxit Softwar... More

PwC Hires Jocelyn Aqua, Set to Focus on Cybersecurity, Privacy Strategy (MESA)

Jocelyn Aqua has joins PwC from the Department of Justice as a principal based in Washington, DC. She joins PwC’s technology, information, communications, media and entertainment... More

Production Security Budgets, Workflows to be Tackled at Dec. 7 Content Protection Summit

How are studios and production companies budgeting for the security needs of film and TV shoots, and what are the baseline measures needed to secure every project? Those are the... More

NSS Labs: Encrypted Web Traffic on the Rise

Cyber security research and testing company NSS Labs is seeing a stark rise in enterprises using both Secure Socket Layer (SSL) and Transport Layer Security (TLS) encryption to sec... More

IT Managers: Employees Consistently Flout Security Policies (Info Security)

Despite investment in cyber security, employees are still putting organisations at risk, according to new research from Databarracks. A new study reveals that nearly two thirds ... More

There is no Standard Career in Cybersecurity. However … (ITSP Magazine)

There is no standard career in cybersecurity. However, people generally work in one of three areas. First, building and/or running an information security program; this could be in... More

Sharing Threat Intel: Easier Said Than Done (Dark Reading)

As cyber threats become more sophisticated and expand to the cloud and the Internet of Things, the sharing of meaningful threat intel  between trusted organizations has become mor... More

The Perfect Cybercrime: Selling Fake Followers to Fake People (New Scientist)

Hackers are recruiting the internet of things into a botnet. But this time they’re not trying to take down the internet. They’re just using them to make fake social media acc... More

MIT Students, Others Teaching IBM Watson About Cybersecurity (Tech Republic)

Mark 2016 as the year that researchers applied artificial intelligence (AI) to the challenges of cybersecurity. If machines can steer our cars and predict our shopping habits, ... More

Will President Trump Be Tough on Online Piracy? (TorrentFreak)

At TorrentFreak we have no interest in reporting on politics, except when it’s relevant to copyright issues. After the surprising victory of Donald Trump earlier this week, se... More

Is the Secure Web Gateway Market Disappearing? (NSS Labs)

As NSS Labs publishes its 2015 Secure Web Gateway (SWG) Market Analysis, the big question in the industry seems to be this: Will next generation firewalls with application control ... More

Three Persistent Challenges for CISOs (Security Intelligence)

The challenges for CISOs in today’s business climate likewise require a disparate set of skills. For those aspiring to attain — or remain in — the holy grail of an informatio... More

5 Takeaways From Cisco’s Big Cybersecurity Report (Fortune)

Companies are still using outdated technology leaving them prone to cyber attacks, security researchers are losing their confidence, and hackers are making millions of dollars thro... More

Virtually All Business Cloud Apps Lack Enterprise Grade Security (Help Net Security)

Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 percent d... More

How to Roll Your Own Threat Intelligence Team (Dark Reading)

A lot of hard work needs to go into effectively implementing an intelligence-driven security model. It starts with five critical factors. Many organizations want to build a thre... More

In a Major Cyber-Hack, Whom do You Call? The White House Spells it Out (Washington Post)

President Obama approved a new directive Tuesday that spells out for the first time in writing how the government handles significant cyber-incidents. The directive lets the pub... More

Sign up for our newsletters
* indicates required
MESA Newsletters