Cyber Security

 

Cybersecurity Priorities for Digital Leaders Navigating Digital Transformation (Equinix Blog)

With threat actors becoming more sophisticated, innovative, and collaborative, cybersecurity responsibilities today extend beyond security professionals—all digital leaders must ... More

Palo Alto Networks and Coordinated Enforcement for Malware

Information sharing for defense is as old as the carrier pigeon. In cybersecurity, coordinated enforcement between products has increasingly become part of the defensive backbone t... More

What Gartner’s Top Cybersecurity Predictions for 2022-23 Reveal (VentureBeat)

Together, Gartner’s top eight cybersecurity predictions warn organizations that they need to employ greater resilience to reduce the impact of more severe cyberattacks. Reducing ... More

The Cat and Mouse Game of Crypto Money Laundering (Decipher)

Cybercriminals are using an array of obfuscation tactics to conceal their illicit transactions. These measures are continuing to become more sophisticated, particularly as law enfo... More

Recovering Ransom Payments: Is This the End of Ransomware? (Security Intelligence)

What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a do... More

Palo Alto Networks Wins 2021 Google Cloud Technology Partner of the Year Award for Security

Palo Alto Networks was recognized for the company's achievements in the Google Cloud ecosystem, helping organizations rapidly transform security operations for future success. (mor... More

The Unrelenting Threat of Ransomware is Pushing Cybersecurity Workers to Quit (ZDNet)

Cybersecurity professionals face immense pressure to keep businesses secure, and this stress is leading many to consider leaving the industry altogether.... More

9 Ways Hackers Will Use Machine Learning to Launch Attacks (CSO)

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors ... More

Unlocking the Changing State of Hybrid Workspace Security (Teradici Blog)

The pandemic has irrevocably changed workspaces for businesses of all sizes. The sudden and necessary shift to working from home continues to have lasting effects, evident in the w... More

IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management

Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. ... More

Palo Alto Networks Founder: Machines Should Run SOCs, Not Humans (SDxCentral)

Palo Alto Networks CTO and founder Nir Zuk expects more vendors will follow its lead to offer an autonomous security operation center (SOC) to replace legacy security information a... More

Cybersecurity M&A Activity Shows No Signs of Slowdown (Dark Reading)

But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.... More

Why Phishing is Still the Top Attack Method (Security Intelligence)

Phishing is the most common way for threat actors to gain access to victims’ networks, according to this year’s IBM Security X-Force Threat Intelligence Index. Approximately 41... More

My Journey at Riscure: Siebe Krijgsman (Riscure Blog)

Siebe Krijgsman, Principal Engineer at Riscure, compares fundamental security topics to old action movies. He discusses the differences between various Riscure tools and the challe... More

Cybercriminals Target Metaverse Investors With Phishing Scams (CNBC)

Investors across the country told CNBC that hackers stole their land in the metaverse by tricking them into clicking on links they believed were genuine portals to the virtual univ... More

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report (Security Intelligence)

Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-For... More

AI’s Role in the Future of Cybersecurity (Tech Radar)

AI is revolutionizing cybersecurity. From automatically detecting network irregularities, to deciding how best to allocate security defenses, some of the most data-intensive tasks... More

Fortinet Amplifies Threat Detection, Response With FortiNDR (SDxCentral)

Fortinet added a network detection and response (NDR) service powered by artificial intelligence (AI) into its threat detection and response portfolio. The FortiNDR uses AI capabil... More

Countdown to Ransomware: Analysis of Ransomware Attack Timelines (Security Intelligence)

IBM X-Force analyzed the evidence from multiple ransomware attack investigations that occurred between 2019 and 2021. In each investigation, access to the victim network was obtain... More

Tata Play Turns to Irdeto and Broadpeak for Cybersecurity (DTE)

The platform has implemented Broadpeak BkS350 Origin Packager pre-integrated with Irdeto Control and Irdeto Media Manager to the OTT aggregation platform, Tata Play Binge. The plat... More

Sign up for our newsletters
* indicates required
MESA Newsletters