Cyber Security

 

Innovation and Collaboration: Arm’s Continuous Commitment to Security (Arm Blueprint)

The digitalisation of products and services means that the value of data has steadily increased over time – for legitimate uses and for hackers. The proliferation of connected de... More

How Businesses Can Get Ready For AI-Powered Security Threats (Dark Reading)

Organizations need to take steps now to strengthen their cyber defenses.... More

Go from Zero-Day Threats to Zero Threats with Inline Sandboxing

Even if you have extensive security in place, unknown and suspicious code and files continue to present serious threats. Until recently, no vendor has been able to deliver in-line ... More

Verimatrix Wins Top Prizes For Artificial Intelligence Security and Brand Growth in 2023 Cybersecurity Excellence Awards

Receiving top honors in the Artificial Intelligence Security and Biggest Brand Growth categories, the recognition marks ongoing growth for the Verimatrix XTD (Extended Threat Defen... More

International Women’s Day: Why Women are the Secret Weapon For Tackling Cybercrime

To attract all types of women into a career in cybersecurity, we need to consider all life stages when breaking down the gender barriers. This means creating paths for women who ar... More

CISA Director: ‘Strong Security Has to Be a Standard Feature’ (Decipher)

The technology market has evolved in such a way over the last few decades that not only is a certain level of defects in software and hardware accepted, it’s expected, and the re... More

Cybersecurity in Manufacturing (Databricks Blog)

With the increasing push toward smart manufacturing, cybersecurity has taken center stage in the operational risk profile of manufacturers. A study by Deloitte shows that 48% of ma... More

An Ongoing SOC Skills Shortage Could Spell Trouble For Compliance (Cybersecurity Dive)

More than 4 in 5 companies admit they either have fewer than five security analysts or don’t have enough analysts to run the SOC, according to new research.... More

Palo Alto Networks Enhances Cybersecurity Capabilities With AI-Powered ITDR Module (HNS)

Palo Alto Networks released new Identity Threat Detection and Response (ITDR) module for Cortex XSIAM, enabling customers to ingest user identity and behavior data and deploy AI te... More

It’s Time to Create More Opportunities For Women in Cybersecurity (Fortinet Blog)

Undoubtedly, our industry needs to create more initiatives to attract a more diverse group of professionals, including women, to STEM-focused careers like cybersecurity. While we�... More

Why You Can’t Ignore Cloud Security (CIO)

While the cloud provides more flexible and scalable IT services, it’s also introducing new and vexing challenges around cyber security. In particular, many organizations are havi... More

The Next Big Threat to AI Might Already be Lurking on the Web (ZDNet)

Artificial intelligence experts warn attacks against datasets used to train machine-learning tools are worryingly cheap and could have major consequences. ... More

New National Cybersecurity Strategy: What Do You Need to Know? (GovTech)

The White House released a new national cybersecurity strategy this past week with five pillars. What’s in the plan, and how will this impact public- and private-sector organizat... More

CISA Director: ‘Strong Security Has to Be a Standard Feature’ (Decipher)

The technology market has evolved in such a way over the last few decades that not only is a certain level of defects in software and hardware accepted, it’s expected, and the re... More

The UK Suffers More Cyberattacks Than Any Other European Country (TechMonitor)

The UK suffered the most cyberattacks of any country in Europe in the last year according to new research, which shows the nation’s energy sector remains one of the most common t... More

Top 7 Cybersecurity Jobs in High Demand (CoinTelegraph)

In today’s digital age, cybersecurity has become a critical aspect of almost every business. Cyber threats are increasing daily, and businesses must take proactive measures to pr... More

Threat Actors Can Use ChatGPT, Too (CD)

While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.... More

Majority of Ransomware Attacks Last Year Exploited Old Bugs (DarkReading)

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.... More

Fortinet’s John Maddison on the New FortiSP5 ASIC

As more people become connected and go off and on the network, we’ve also seen the security infrastructure spread to allow this connectivity. Now we’re seeing firewalls everywh... More

What’s Next In Cybersecurity (TR)

In the world of cybersecurity, there is always one certainty: more hacks. That is the unavoidable constant in an industry that will spend an estimated $150 billion worldwide this y... More

Sign up for our newsletters
* indicates required
MESA Newsletters