Cyber Security

 

How Hackers are Weaponizing AI (TechHQ)

In an age where everything is becoming connected and data is regarded as a business’s most valuable commodity, cybersecurity continues to diversify in a hyper-competitive marketp... More

Vast Majority of Cyberattacks on Cloud Servers Aim to Mine Cryptocurrency (ZDNet)

An analysis of one year's worth of cyber-attacks recorded in cloud honeypot servers reveals that the vast majority of hackers target cloud infrastructure with the purpose of deploy... More

Convergent Risks Expands Security Assessment Resource in APAC

Convergent Risks announced that it has expanded capacity in the APAC region with additional full-time security assessment resource for the region in response to increased demand fr... More

House Passes Bipartisan IoT Security Bill to Fix ‘Glaring Gap’ in Cyber Infrastructure (FNN)

A bipartisan bill setting minimum security standards for Internet of Things devices connected to federal networks passed the House Monday. The bill now awaits a Senate floor vote b... More

The Future of Cybersecurity – Pitting Machine Against Machine (Tech HQ)

At Darktrace’s AI labs, Cyber Analysts have been exploring what offensive AI might look. Developing prototypes that autonomously determine an organisation’s most high-profile t... More

Ransomware: Huge Rise in Attacks This Year as Cyber Criminals Hunt Bigger Paydays (ZDNet)

Researchers warn of a seven-fold rise in ransomware attacks compared with last year alone - and attackers are continually evolving their tactics.... More

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain (Security Intelligence)

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducte... More

How AI Will Automate Cybersecurity in the Post-COVID World (VB)

In the future, nearly every piece of technology we use will be under constant attack – and this is already the case for every major website and mobile app we rely on. Understandi... More

How the Pandemic Has Made its Mark on Cybersecurity (TWA)

2020 has been hard on all businesses. A sudden shift to remote work combined with a spike in cyberattacks has served up a dangerous cocktail – and businesses have scrambled to sh... More

OpSec Security Introduces Riya Sood as Chief Human Resources Officer

OpSec Security has introduced Riya Sood, Chief Human Resources Officer, as a newest member of the Executive team. (more…)... More

Data Breach Protection Must Include Physical Security (Security Intelligence)

If most of your business’ data and workloads are handled on public clouds, it can be easy to forget about the onsite servers.... More

4 Steps to Consider When Starting a New Cybersecurity Career (Security Intelligence)

At a time when layoffs are painfully common, now might not seem like a great time to look for a new job or switch careers. Or, is it? The cybersecurity skills gap has not gone away... More

IMAGICA SDI Studio Completes the Trusted Partner Network Assessment Process (MESA)

IMAGICA SDI Studio is a new Japanese dubbing facility that opened in Tokyo in February 2020. In its first six months of operation, ISS has successfully delivered Japanese dubbing s... More

CISA Releases 5G Security Strategy (Decipher)

The United States Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has released the National Strategy to Secure 5G for securely deploying 5G in ... More

AI on the Email Offense (Dark Reading)

Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.... More

6 Ransomware Trends You Should Watch for in 2020 (Security Intelligence)

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses ... More

How COVID-19 Will Help Lead the Shift to AI-First Cybersecurity (IT for All)

For some organizations, the pandemic has triggered a series of events that have overtaxed security systems. For others, it has cracked open and exposed the very real and previously... More

8 Steps Towards a Simple, Airtight Cybersecurity Plan (TechHQ)

If the worst does happen, just how badly a breach affects your business depends on how well you’ve prepared.... More

Study: Enterprise Security Challenges Surge With Spike in Work From Home (CISO)

There has been a sudden surge in enterprise security challenges owing to the spike in work from home. According to a new study, sudden changes in priorities, poor network visibilit... More

Cybersecurity at a Crossroads: Moving Toward Trust in Our Technologies (Tech Republic)

Cloud computing changed the technology landscape forever. Here's hoping that trust will be the next frontier of computing.... More

Sign up for our newsletters
* indicates required
MESA Newsletters