Cyber Security

 

Here are 5 of the Highest-Paying Cybersecurity Jobs (Fortune)

As the threat of cyber attacks becomes a more pressing issue, C-suite executives are forced to take a look at their bottom line and take these challenges more seriously. Companies ... More

Streamkeeper Named a Product of the Year (Verimatrix Blog)

Streamkeeper provides trusted, cloud-based digital rights management for securing premium movies, television programmes and live steaming events such as sports, concerts and red-ca... More

Fortinet Issues More Than 1M NSE Certifications, Addressing the Need for Cybersecurity Upskilling

Another Cybersecurity Awareness Month kicks off, reminding us that cybersecurity affects everyone and it is everyone’s responsibility to follow best practices. This month also se... More

8 Ways to Shore Up Cybersecurity Agreements (CFO)

Here's how companies can better negotiate the data privacy language in cybersecurity contracts.... More

Fortinet Expands AIOps to 5G, LTE Gateways (SDxCentral)

Fortinet announced enhanced AIOps capabilities across its networking portfolio, including artificial intelligence-based network operations management for 5G and LTE gateways. The e... More

TELUS Taps Palo Alto Networks for 5G, Cloud, Zero-Trust Security (SDxCentral)

TELUS will use the security vendor’s hardware and software firewalls to protect high-capacity network interfaces across its 5G stand-alone core and internet perimeter while provi... More

archTIS Signs Three-Year NC Encrypt Agreement With Singapore Government Contractor (Proactive)

"In the face of enhanced cyber security risks, business digitalisation and the explosion of remote work, archTIS solutions enable organisations to enhance the security of the Micro... More

3 Keys to an Effective Enterprise IT Risk Management Strategy (Security Intelligence)

The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data Breach report. In addition, laws ar... More

IBM Adds 14 HBCUs to Cybersecurity Center Program (EdScoop)

The Cybersecurity Leadership Centers, as the programs are known, include curriculum, professional development, access to IBM’s suite of enterprise security products and simulated... More

Palo Alto Networks CEO: We are Not Seeing the Macro Impact in Cybersecurity (CNBC)

Palo Alto Networks CEO Nikesh Arora joins ‘TechCheck’ to discuss business expansion and consolidation in volatile times, cloud security, and shifting demand creating a lengthen... More

Irdeto and Realtek Partner for Android TV Hybrid STB and RDK (DTE)

The new STB will be based on Realtek’s RTD1319D chipset with Irdeto hybrid middleware for Android TV and RDK. It will support VVC/H.266 codec and other audiovisual technologies s... More

Prisma Cloud Delivers Context-Aware Software Composition Analysis to Secure Deployment of Open Source Software

Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code... More

3 Reasons Why Technology Integration Matters (Security Intelligence)

Sharing threat intelligence and defense strategies can help to establish a more secure future for everyone. Some of the world’s largest and most successful companies take advanta... More

The Scary Future of the Internet: How the Tech of Tomorrow Will Pose Even Bigger Cybersecurity Threats (ZDNet)

Innovations including quantum computing, AI and smart cities could bring a range of benefits to everyone - but hackers will also be looking to exploit them.... More

Threat Research: Meeting the ‘Ministrer’ (Fortinet Blog)

Things not always being as they seem is a common adage that lends itself well to the cyber world. Phishing tries explicitly to convince an email recipient that a message is legitim... More

Survey Shows CISOs Losing Confidence in Ability to Stop Ransomware Attacks (Dark Reading)

Despite an 86% surge in budget resources to defend against ransomware, 90% of orgs were impacted by attacks last year, a survey reveals.... More

Shift Happens, Be Ready With Code-to-Cloud CNAPP (Palo Alto Networks Blog)

There is no debate that the majority of applications have moved to the cloud, creating a demand for cloud-native security. In fact, Gartner estimates that by 2025 over 95% of new c... More

Browser Isolation – the Future of Browser Security (TM)

Browser isolation creates a safe space where employees can interact with digital content but not run the risk of compromising IT security.... More

Palo Alto Networks CEO: Effective SASE Starts With ‘Zero Trust With Zero Exceptions’ (SDxCentral)

Palo Alto Networks executives argue that zero-trust security becomes a business imperative in the era of hybrid cloud and flex work and an effective secure access service edge (SAS... More

Overlooked Strategies for CISOs to Consider for Cybersecurity Today (Fortinet Blog)

With the ever-growing list of cybersecurity threats, it's easy to lose sight of what CISOs should prioritize. There are many technologies, services, and approaches to consider when... More

Sign up for our newsletters
* indicates required
MESA Newsletters