Cyber Security

 

How Palo Alto Networks Modernized its Security Management With AI (ZDNet)

Palo Alto Networks introduced its Cortex XSIAM, which can be viewed as a modernized SIEM with an infusion of artificial intelligence. The concept of the XSIAM is that it uses AI to... More

How AI is Shaping the Cybersecurity Arms Race (The Conversation)

AI is an intriguing tool that could help stem the tide of cyberattacks and, with careful cultivation, could become a required tool for the next generation of cybersecurity professi... More

Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022 (Security Intelligence)

For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This was among... More

SAP Teams Up With HBCUs to Attract Talent to the Cybersecurity Curriculum

SAP shared plans to sponsor several historically black colleges and universities starting with Hampton University and those of the Atlanta University Center Consortium – Clark At... More

IBM Cybersecurity Hub to Mitigate APAC Cyberattacks (TWA)

In a move that has the potential to revolutionize cybersecurity training, IBM virtually inaugurated its Cyber Range and IBM Security Command Center. The center located in Bengaluru... More

5 Cybersecurity Spending Areas to Evaluate (CFO)

As computing environments change and bad actors switch tactics, most organizations will need to increase or redirect their investment in cybersecurity.... More

Ransomware Victims are Paying Up – But Then the Gangs are Coming Back for More (ZDNet)

Cybersecurity experts warn against paying ransoms - this is why.... More

Want Real Cybersecurity Progress? Redefine the Security Team (TNS)

If businesses want to see progress on the cybersecurity front, they’ll need to change this state of affairs by making security a collective responsibility.... More

Five Reasons Why Hackers Do Not Want You to Consolidate Your Security Toolset (Edgescan Blog)

While cost reduction and tool management bandwidth concerns might be why you are considering Security Tool Consolidation – the Hacker has a different agenda. They are counting on... More

Equinix, Cisco Deliver End-to-End Virtual Firewall Security (Interconnections)

Applications and remote environments give rise to the need for flexible and agile security. A virtual firewall is a network security solution designed for cloud environments or whe... More

Pivot to a Secure Cloud with Automation (TCS Blog)

Today’s enterprises want to rapidly adopt multi-cloud to accelerate their digital transformation goals. However, moving to a multi-cloud alone cannot be a silver bullet unless yo... More

Edgescan Sets Partnership With Manicode

Edgescan announced a partnership with Manicode Security, the secure coding education company. With a combination of lecture, security testing demonstration, and code review, Manico... More

Riscure Introduces Riscuberry for Embedded Systems Security Training

The IoT target Riscuberry serves multiple purposes. Riscuberry is not only an up-to-date target for embedded security training but also a training target for FI and SCA. Riscuberry... More

Will the Metaverse Usher in a Universe of Security Challenges? (Security Intelligence)

As more human activity takes place in virtual spaces, the challenges around security will become more important. The shift from today’s VR to tomorrow’s metaverse is mainly abo... More

Palo Alto Networks Detects ‘Nebula’ Threats With OS, Hardware Upgrade (SDxCentral)

Palo Alto Networks introduced the latest version of its PAN-OS software, dubbed Nebula, for sophisticated, zero-day attack detection along with new additions to its hardware firewa... More

Irdeto Watermarking Completes Cartesian Robustness Test (RTN)

Digital platform cybersecurity prover Irdeto’s TraceMark forensic watermarking embedding and detection technology has successfully completed a thorough Farncombe Security Audit W... More

Security Strategies Evolve While Spending Flatlines (CD)

Surprisingly, IT security spending has been flat for several years, recent data from Gartner show, but that doesn't mean organizations are standing still. Investment in new securit... More

Cybersecurity and Forensic Accounting Join Forces to Combat Criminals

Not a day goes by without breaking news of a sophisticated white collar crime scheme perpetrated against a corporation, government entity or individual. In the era of digital trans... More

archTIS, Threat Protect Announce Partnership

archTIS and Threat Protect announced a new partnership to add archTIS’ attribute-based access control (ABAC) information security solutions to Threat Protect’s comprehensive ra... More

Microsoft Introduces Cyber Signals to Help Defend Against Cyber Threats (TR)

The new informative reports will evaluate the tactics, techniques and strategies used by cybercriminals to help security, information and privacy officers, and their teams, to impl... More

Sign up for our newsletters
* indicates required
MESA Newsletters