Cyber Security

 

Fortinet Fortifies FortiGate Firewalls With 5th-Gen Custom ASIC (SDxCentral)

Fortinet introduced its latest custom ASIC to power its next generation of entry and mid-range FortiGate firewalls. The vendor touted the new chip as offering better firewall perfo... More

Box CEO on the ‘Perfect Storm’ of Challenges In Cybersecurity (CD)

The shift to interconnected operations and an expansive distribution of work has created a “perfect storm of complicated challenges” for cybersecurity, Box CEO Aaron Levie said... More

Third-Party App Stores Could Be a Red Flag For iOS Security (Security Intelligence)

The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European... More

Five Ways to Get the Chief Information Security Officer Role Right (CPO)

The growing reliance on technology is making organizations increasingly vulnerable to cyber-attacks. Technology underpins most organizational processes, business growth is powered ... More

Phishing Attacks are Getting Scarily Sophisticated (ZDNet)

Phishing campaigns use fake social media profiles, in-depth research, and more to trick unsuspecting victims into clicking malicious links.... More

5 Golden Rules of Threat Hunting From IBM Security X-Force (Security Intelligence)

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some ca... More

Everyone Wants to Build a Cyber Range: Should You? (Security Intelligence)

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team train... More

Better Phishing, Easy Malicious Implants: How AI Could Change Cyberattacks (Dark Reading)

Current defenses are able to protect against today's AI-enhanced cybersecurity threats, but that won't be the case for long as these attacks become more effective and sophisticated... More

Cybersecurity Hiring Remains Strong Amid Tech Layoffs (Axios)

The demand for cyber workers kept steady in recent months as the broader tech industry suffered from a wave of cost-cutting layoffs, according to data published today.... More

4 Key Features of an Effective Mobile Game Security Solution Indicated by Devs (Irdeto Insights)

A great gaming experience is hard to achieve without adequate gaming protection – this statement is often stressed by developers. Yet, when your next title is live, you may real... More

ChatGPT: Friend or Foe? (Verimatrix Blog)

The fastest-growing enterprise security threat today is from mobile apps and the billions of devices that connect to them.... More

Convergent Supports DNEG With the New TPN+ Security Assessments

Convergent announced that it is working with leading vfx provider, DNEG, on a series of security assessments through the new TPN+ Platform. DNEG is an early adopter of the new plat... More

People, Process and Technology: The Incident Response Trifecta (SI)

Let’s say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for... More

Fastly CISO Talks Career Path, Cybersecurity, and More (IDG)

Mike Johnson has over twenty years of experience in the security industry. He currently serves as CISO at Fastly where his team secures the network and platform behind the best of ... More

Visual Data Becomes Trusted Partner Network Program Early Adopter to Support Entertainment Content Security

Visual Data is reinforcing its commitment to the highest levels of security for entertainment content by becoming an early adopter of the Trusted Partner Network’s (TPN) new memb... More

6 Roles That Can Easily Transition to a Cybersecurity Team (Security Intelligence)

With the shortage of qualified tech professionals in the cybersecurity industry and increasing demand for trained experts, it can take time to find the right candidate with the nec... More

Is Your DRM Effectively Securing Your Revenue Streams? (EZDRM Blog)

Treating DRM use as a simple checkbox item for satisfying content licensing requirements may lead to a false sense of how effective the technology can be for protecting content and... More

Why Quantum Computing Capabilities are Creating Security Vulnerabilities Today (Security Intelligence)

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CIS... More

The Dark Web’s Criminal Minds See IoT as the Next Big Hacking Prize (CNBC)

Cybersecurity experts say 2022 may have marked an inflection point due to the rapid proliferation of IoT devices. There are now an estimated 17 billion IoT devices in the world, fr... More

People are Already Trying to Get ChatGPT to Write Malware (ZDNet)

The ChatGPT AI chatbot has created plenty of excitement in the short time it has been available and now it seems it has been enlisted by some in attempts to help generate malicious... More

Sign up for our newsletters
* indicates required
MESA Newsletters