Cyber Security

 

When Cyber Pirates Strike, Stick With Innovation (S+B)

Although hacks are often linked to downturns in revenues and R&D spending, firms can still roll out major improvements to separate themselves from the competition.... More

The Cost of Ransomware Attacks Worldwide Will Go Beyond $265B in the Next Decade (ZDNet)

Ransomware has been likened to a hydra -- cut off one head, and more appear in its place. Ransomware is now one of the most potentially damaging -- and a very popular -- types of m... More

Ransomware-as-a-Service: Trending New Money-Making Model (INTRUSION Blog)

Earlier the purpose of ransomware operators was to encrypt data and decrypt it on payment of ransom. Nowadays, the story has changed. Threat actors have been doing thorough researc... More

IBM to Establish New Cybersecurity Center for U.S. Federal Clients

The center will facilitate events and learnings, drawing on IBM's cybersecurity expertise from delivering software and managed services to over 17,500 security customers globally. ... More

How the Pandemic Gave Cybercriminals the Advantage (Tech Monitor)

Lockdown disrupted the traditional model of cybersecurity. Hybrid working is breaking it completely.... More

Why CISOs Can’t Afford to Have Data Breach Fatigue (CD)

Security teams monitor thousands of alerts per day, which are hard to escape even in off hours, as news about data breaches become mainstream.... More

Interview: IBM’s Cybersecurity Engineer Holly Wright (WLT)

Holly Wright values the future’s endless possibilities. Not only is she an advocate for STEM, an innovative and growing approach to education that integrates science, technology,... More

Cyber Insurance Industry Grapples With Evolving Security Risks (Decipher)

The skyrocketing number of cyberattacks is driving up cyber insurance demand and premiums - but it's also leading to a moment of self-reckoning within the cyber insurance market, a... More

U.S. Seizes Domains Used by APT29 inRecent USAID Phishing Attacks (Bleeping Computer)

The two domains seized by the DOJ were used to receive data exfiltrated from victims of the targeted phishing attacks and send further commands malware to execute on infected machi... More

Zero Trust: Bringing Privileged Access and Data Security Analytics Together (Security Intelligence)

Who owns the data in your organisation? If you’re like many, there’s a chance it’s fragmented. Maybe legal owns governance while security owns data security. IT, legal, secur... More

Palo Alto Networks Leads Efforts to Combat Ransomware

Data from the Palo Alto Networks Unit 42 threat intelligence team demonstrates just how rapidly the cost of these attacks is growing: The average cyber ransom paid more than double... More

State of Security Research Zeroes in on Data Strategies (Splunk Blog)

Data is not only what we’re protecting, it’s what lets us optimize our investments and effectively communicate risk and mitigations. It’s what tells us when threat actors are... More

The Makings of a Better Cybersecurity Hire (Dark Reading)

Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.... More

IoT Must Become the Internet of Secure Things for Widescale Acceptance in the 5G Era (Verdict)

As the world reopens for business, 2021 is seen as a year of cyber security catch-up for the IoT – one of many technology themes impacted by the pandemic and the ongoing chip sho... More

Amid Cyber Workforce Crunch, CISOs Think Outside the Box (Decipher)

As cybersecurity teams continue to grapple with the cyber workforce gap, security leaders are starting to sniff out candidates from unconventional backgrounds and better prioritize... More

Palo Alto Networks CEO: Work From Home is ‘Here to Stay’ (CNBC)

Palo Alto Networks CEO Nikesh Arora said the networks security company is benefiting from a rise in remote security and software-as-a-service products as companies adapt to new wor... More

Microsoft Delivers New Guidance to Secure Hybrid Work Environments (The Record)

To help small and medium-sized businesses, Microsoft has launched a range of new verification features, which include Azure AD Conditional Access to give admins more granular acces... More

How to Reduce Zero Trust Frustration by Capturing Context (Security Intelligence)

Zero trust remains one of the best ways for companies to reduce total risk. By knowing the potential risk of any request — both inside and outside the enterprise network — rath... More

Splunk to Buy Security Intelligence-Sharing Startup TruStar (VentureBeat)

The acquisition will add TruStar’s cloud-native, cyber intelligence-sharing capabilities and automated processes to Splunk’s growing cybersecurity portfolio.... More

Palo Alto Networks Zeroes in on Zero Trust Security (SDxCentral)

Global enterprises expose a new, serious security vulnerability every 12 hours, according to Palo Alto Networks’ latest attack surface data. “That means if you’re a Fortune 5... More

Sign up for our newsletters
* indicates required
MESA Newsletters