Cyber Security

 

Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope (ThreatPost)

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap.... More

Why Cybersecurity is Still So Complex (Forbes)

Today, digital assets have the highest value. Our neighborhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evol... More

How Remote Working is Making Cyberattacks Easier to Pull Off (ZDNet)

This year has forced organizations to adapt quickly to enabling employees to work from home. That's creating 'chaos with no control' - which cyber criminals are exploiting. ... More

Startups are Re-Defining Cybersecurity as a Driver for Growth (Forbes)

Imagine a world where businesses execute strategies without worrying about securing data. Now imagine a world where fast paced cybersecurity capabilities enable trusted data to bec... More

Ransomware Attacks Show Little Sign of Slowing in 2021 (Dark Reading)

Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks.... More

Cybersecurity Strategy: Building Trust on Shifting Sands (Security Intelligence)

Transforming the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a cybersecurity strategy. Like wal... More

What CIOs Need to Know About 5G Cybersecurity (Tech HQ)

As the transition towards 5G looms, get prepared for a host of new cyberthreats.... More

The Pressures the Online Gaming Community Faces When it Comes to Cybersecurity (SM)

Online games and specifically the Massive Multi-Player games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platf... More

Modernizing Your Security Operations Center for the Cloud (Security Intelligence)

Several factors are converging to exert pressure on how security operations centers (SOCs) traditionally function. Evolving information technology (IT) infrastructure, such as clou... More

Work From Home: Rethinking Security for a Boundaryless World (Avanade Insights)

The reality is that even before the coronavirus pandemic sent millions of employees to the home office, our personal digital ecosystems were already fraught with risk and complexit... More

State of Cybersecurity 2020: Changes, Challenges for WFH Culture (Richie May Blog)

As we have continued to stress in our most recent articles, many aspects of how businesses operate have changed over the past year, especially as a result of COVID-19. One thing th... More

Cybersecurity Awareness: A Key Lever in Cyber Defense (Forbes)

Organizations are increasingly adopting intelligence-driven cyber defense strategies. The costs and complexities involved in waging cyberattacks are significantly lower when compar... More

IBM Advances Cloud Pak for Security to Manage Threats Across Tools, Teams, Clouds

IBM announced new and upcoming capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect, respond to and protect... More

Can We Take Business Lessons From Cybercriminals? (Tech HQ)

While we defend our businesses like islands, information sharing is giving cyber attackers the upper hand. ... More

Cybersecurity and Your Passwords (Forbes)

What's something that stands between you and a cybercriminal that's in your full control? Your password. The world of password security is a tricky one because many of the best pra... More

Cybercrime is Now a Global Worry (IT Pro Portal)

Pretty much anyone that uses the internet worries about cybercrime.... More

How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start (Security Intelligence)

A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations a... More

3 Ways to Tighten Security and Get Ready for the New Normal (Avanade Insights)

Imagine if cybercriminals had a shred of decency. If they did, they wouldn’t take advantage of a global pandemic that has so far cost more than 400,000 lives. Unfortunately, that... More

Data Governance in the 21st-Century Organization (MIT Sloan)

Good governance requires balance and adjustment. When done well, it can fuel digital innovation without compromising security.... More

Cybersecurity Today: The Intersection of Technology and Behavior (Security Intelligence)

Wireless LAN, Bluetooth connectivity or mobile data transfer (which will explode with the wider deployment of 5G) are ubiquitous today. So what does this mean to the everyday perso... More

Sign up for our newsletters
* indicates required
MESA Newsletters