Cyber Security

 

A Closer Look at Splunk Security Analytics for AWS

Available exclusively in AWS Marketplace, the offering gives smaller security teams an accessible way to harness the power of Splunk. Built on the foundation of Splunk’s market-l... More

Palo Alto Networks Builds on Retail, Hospitality Cybersecurity

Over the past year and half, the retail and hospitality verticals have been challenged, but there are some bright spots – digital investments and innovations have been at the cen... More

SHIFT72 Protects High Value Content From Geo-Piracy With GeoGuard VPN, Proxy Detection

GeoComply announced that SHIFT72 has integrated the award-winning GeoGuard VPN and proxy detection solution to better protect its customers’ high-value, territorially-restricted ... More

Avoid Blind Spots: Is Your Incident Response Team Cloud Ready? (SI)

Let’s peel back the layers of cloud itself, and then take a look at how incident response teams must behave differently to thwart breaches in a more complex cloud environment. Fo... More

SAP Launches Real-Time Cloud-Based Enterprise Threat Detection Solution for SAP Applications as Managed Service

The solution and service aim to support companies in detecting cyber-attacks in real time by continuously collecting, correlating, and analyzing anomalous and suspicious events acr... More

When Should You Protect Against Ransomware? Now, Before it Hits You (Palo Alto Networks Blog)

Sounding the alarm and shutting down access to critical software in a panic is not the best way to fight the growing ransomware epidemic. When organizations wait to react to ransom... More

Protecting Your Organization From the Inside Out: How to Combat Insider Threats (Forbes)

Attacks on organizations from external malicious actors seize headlines on a daily basis. These stories matter, because they’re an important reminder to both policymakers and bus... More

Anuvu Launches Cybersecurity Product in Renewed Partnership With Elcome

Under this agreement, the companies will continue serving maritime customers with connectivity and cyber security solutions that ensure crew welfare and compliance with the Interna... More

The Murky Cybersecurity Threat of Browser Extensions (Tech HQ)

Not every browser extension is safe – many maliciously open the user to a variety of issues including fraud and identity theft.... More

Your Home Away From Home May Not be as Cybersecure as You Think (Security Intelligence)

Home is where the ‘smart’ is. A recent study revealed the average American household has 25 connected or Internet of Things (IoT) devices. The number of consumers who have smar... More

Updated Joker Malware Floods Into Android Apps (Threat Post)

The Joker mobile trojan is back on Google Play, with an uptick in malicious Android applications that hide the billing-fraud malware, researchers said. It’s also using new approa... More

Ransomware is a Worldwide Problem: Palo Alto Networks (Bloomberg)

Palo Alto Networks Senior Vice President Wendi Whitmore discusses the new business model behind ransomware attacks and how it's disrupting supply chains.... More

Multi-DRM Best Practices for Live Sports Streaming, Other Live Events (The DRM Blog)

Live sports streaming is a rapidly growing industry that will continue to grow as the world continues to become more digitally connected and as people migrate from cable TV package... More

Amateur Critical Infrastructure Attacks Growing in Frequency, Relative Severity (SI)

Low-sophistication operational technology (OT) attacks grew in frequency and relative severity over the previous few years, according to Mandiant. In doing so, they broadened the t... More

Cybersecurity Skills Remain in High Demand but Pay is Stagnating (Tech Monitor)

Despite the pandemic putting cyber threats at the core of businesses' worries, a focus on front-office roles means many security professionals have not seen salary increases.... More

Irdeto, confinis to Launch the First Cybersecurity Assessment Tool in the Medical Devices Industry

Irdeto and confinis will provide medical device companies a comprehensive toolkit to determine the regulatory readiness of their medical devices. (more…)... More

Addressing the Cybersecurity Skills Gap Through Neurodiversity (TechCrunch)

Addressing the skills gap and strengthening your own security team means bringing in different minds and perspectives — and that starts with embracing neurodiversity. To even hav... More

As Cryptocurrencies Surge, so Do the Scams (Racontuer)

Investment scams involving digital assets like bitcoin have skyrocketed in recent months. However, authorities are striking back with some success.... More

Thoughts on What to Do to be More Resilient to Ransomware (Edgescan Blog)

There is no silver bullet but here are some tips that may reduce the risk and impact if you’re unfortunate enough to be faced with a breach.... More

Why Hackers Like Your Remote Access (Palo Alto Networks Blog)

Cybersecurity is a constant game of cat and mouse, with attackers and defenders locked in a perpetual race for finding, exploiting and patching vulnerabilities. With most of the wo... More

Sign up for our newsletters
* indicates required
MESA Newsletters