Cyber Security

 

Time to Rethink Your VPN: A Gateway for Vulnerabilities (Interconnections)

With remote working on the rise, cybercriminals have revved up their antics. Enterprises in the Asia-Pacific region experienced a 168% year-on-year increase in cyberattacks in May ... More

Securing the New Frontiers of Critical Infrastructure Networks (Palo Alto Networks Blog)

These systems continue to evolve from air gapped, legacy systems to more modern, IT and cloud-connected systems. This evolution results in an increase in the attack surface that ne... More

IoT Security and the Internet of Forgotten Things (Security Intelligence)

How many IoT devices are out there waiting for a breach? Today, about 12.3 billion devices connect to the internet worldwide. What about the devices you might have forgotten about?... More

Supply-Side Hackonomics: Supply Chain Attacks and Data Security (SI)

Most people now know far more about supply chains than they ever wanted to. Still, anyone could forgive you for not knowing the term ‘supply chain hack’. Often, when the media ... More

Cheating, Tampering and Piracy in Gaming: Are You Worried Enough? (Irdeto Blog)

If you’re a game developer, you’re probably very well aware of all the different risks that cheating, tampering and piracy mean to player engagement and your business. Decrease... More

FBI: Cybercrime Victims Suffered Losses of Over $6.9B in 2021 (Dark Reading)

he Internet Crime Complaint Center fielded 847,376 cybercrime reports last year, an increase of 7% from 2020.... More

How to Build a Culture of Cybersecurity (MIT)

Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture.... More

Palo Alto Networks CEO: I’ve Never Been Worried About Cybersecurity More Than Now (CNBC)

Nikesh Arora, Palo Alto Networks CEO, joins ‘Closing Bell’ to discuss his thoughts on cybersecurity concerns due to the ongoing conflict in Ukraine.... More

It’s Not Fair, But Cybercrime is Cheap (Security Intelligence)

It may not be fair, but cyber crime is cheap. How cheap? You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get... More

Starting at Home: Cybersecurity in the Hybrid Workplace (Security Intelligence)

As people settle into the late stages of the pandemic, the hybrid workplace is not going anywhere. Therefore, the enterprise must address the increasing number of entry points into... More

Global VPN Market Set to Skyrocket in 2022 (IT Pro)

The Asian-Pacific region is expected to see the highest growth rates over the next four years.... More

Prisma Cloud Supply Chain Security: Reducing Code Complexity and Risk (Palo Alto Networks Blog)

Cloud native supply chains have been highly tuned to meet the demands of DevOps speed and innovation. They are typically made up of containers and infrastructure as code (IaC) with... More

New IBM Cybersecurity Hub to Help Asia Pacific Organizations Build Cyber Resiliency

The centerpiece of this investment is the new IBM Security Command Center, the first of its kind in the region, for training cybersecurity response techniques through highly realis... More

Why the Future of Cybersecurity Rests in Developers’ Hands (Forbes)

According to a recent survey, over one-quarter of U.S. consumers have not taken any steps to protect their digital/online privacy - and that means it is more important than ever fo... More

How Blockchain Could Revolutionize Cybersecurity (Forbes)

More distributed software deployment, database management and security protocols could render targets less vulnerable by spreading attack surfaces and relying less on centralized t... More

How Cybercriminals Exploit QR Codes to Their Advantage (CISO)

With new kinds of cyber threats predicted to surge in 2022, users should be vigilant about the risks involved and think before scanning their next QR code.... More

Why Companies are Moving to a ‘Zero Trust’ Model of Cybersecurity (CNBC)

The latest catchphrase in cyber security might as well be “don’t trust anyone — or anything.” The zero trust model of security, which takes the approach that no users or de... More

The Cybersecurity Challenges of Working From Anywhere (Forbes)

The shift to remote working during the pandemic coincided with a significant rise in cybersecurity incidences as criminals sought to take advantage of both the stress and disruptio... More

Hybrid Work is Here to Stay, and Peering Can Help Support It (Interconnections)

2021 was a record year for distributed denial of service attacks, and this year is shaping up to be even worse. The shift to hybrid work has exacerbated these trends. It’s create... More

2022 May be the Year Cybercrime Returns its Focus to Consumers (Bleeping Computer)

Cybercriminals like to follow the shortest and most accessible pathway to achieving their goals, and when it comes to targeting corporate networks, the best chances lie at targetin... More

Sign up for our newsletters
* indicates required
MESA Newsletters