Cyber Security

 

Why Netflix’s Password Sharing Crackdown Makes Sense in Today’s Streaming World (Forbes)

The hearts of millions of TV-watching young adults likely fluttered just a bit this week when they heard Netflix may start cracking down on password sharing between people who don�... More

What Makes Ransomware a Constant Enterprise Pain Point (CD)

Threat groups mimic and manipulate the tactics, techniques and procedures of other groups, making ransomware attacks more difficult to prevent.... More

Why the Demand for Application Development Security Skills is Exploding (Security Intelligence)

Application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill ... More

How Multi-Source Location Data Can Secure Big-Ticket Events (GeoGuard Blog)

Did you know 51% of sports fans watch pirate content at least once a month? And that’s just the armchair pirates during the regular season. What about highly anticipated prize fi... More

Did COVID-19 Usher in Cybercrime’s Golden Age? (SDxCentral)

“The pandemic was the heyday that attackers were looking for,” said Limor Kessem, executive security advisor at IBM Security. “It ushered in a period of attracting people to ... More

How Do Companies Assess Risk? It’s a System-by-System Question (Cybersecurity Dive)

Every piece of technology is vulnerable to threat actors, but each organization and cybersecurity team decides which software and technology adds risk to its business operations.... More

Why the Ability to Predict Cybersecurity Threats Matter (TechHQ)

Identifying risks ahead of time, blocking any threats before they can adversely affect your business is extremely important.... More

Why Cybersecurity Risk Management Needs to Keep Evolving (Security Intelligence)

The phrase ‘future-proof’ is seductive. We want to believe technology prepares us for the future. But with threat actors and developers in an arms race to breach and protect, c... More

These Hackers Sell Network Logins to the Highest Bidder – And Ransomware Gangs are Buying (ZDNet)

A growing class of cyber criminals are playing an important role on underground marketplaces by breaching corporate networks and selling access to the highest bidder to exploit how... More

The Emergence of the Personalized Attack Chain (TechNative)

Expect 2021 to be the year cyber attacks get personal.... More

Cybercrime Groups are Selling Their Hacking Skills (Some Countries are Buying) (ZDNet)

Nation-state hacking groups don't need to do the work themselves anymore: they can hire criminal gangs to breach targets for them - with the added bonus that it's harder to trace t... More

Palo Alto Networks Completes Acquisition of Bridgecrew

The acquisition will enable "shift left" security, with Prisma Cloud becoming the first cloud security platform to deliver security across the full application lifecycle. (more&hel... More

The Uncertainty of Cybersecurity Hiring (SI)

Cybersecurity hiring is going through a weird phase. The pandemic, the remote work movement, budget changes and the rising aggression and refinement of cyber attacks are all major ... More

Deepfaking It: The New Cybersecurity Frontier (Raconteur)

From impersonating a top executive to opening money-laundering bank accounts, deepfake fraud is becoming a growing problem and poses new challenges.... More

Three Questions Every CISO Should Ask When Building an Insider Risk Program (Code42 Blog)

Why insider risk management requires different people, process and technology.... More

How a CISO’s Executive Role Has Changed (Security Intelligence)

Now that CISOs have greater access, directors and other C-suite members are more willing to see that their domain isn’t a separate entity but needs to be part of overall business... More

Cybersecurity and Hybrid Work: What CISOs Should Know (CDO Trends)

As the concept continues to become the norm for many this 2021, organizations must act with utmost urgency to address the emerging cybersecurity and risk challenges associated with... More

New BuyDRM Paper Touts Multi-Pronged DRM Strategy

Digital rights management (DRM) technology and content security provider BuyDRM has debuted a new white paper that covers all corners of the technology, and highlights why a multi-... More

Code42 Expects Security Business to Double in 2021

Company achieved triple-digit growth in 2020, propelled by product launches, strategic security partnerships, and authorization in federal market. (more…)... More

Palo Alto Networks Introduces Prisma Access 2.0

As work continues to change and needs to be done securely everywhere, with no compromise on speed, security or performance, Prisma Access 2.0 introduces critical enhancements, incl... More

Sign up for our newsletters
* indicates required
MESA Newsletters