Cyber Security

 

Why Security Validation is Vital as Organizations Become More IoT Driven (SDC)

Because of the diversity of devices comprising the IoT, there’s no singular solution that can secure all of the devices used by organizations. Securing IoT and the rest of the ne... More

Schools Already Struggled With Cybersecurity – Then Came COVID-19 (Wired)

A lack of dedicated funding and resources made it hard to keep data secure—and that was before classes moved almost entirely online.... More

Cybersecurity for a Remote Workforce (MIT Sloan)

Organizations must act quickly to mitigate the cybersecurity risks created by a sudden shift to remote work.... More

Hackers Will Lurk in Your Email for More Than a Week After Breaking in (Tech Republic)

Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks. ... More

Malicious Coronavirus Domains Capitalize on Reopening Economies (Verdict)

Cybercriminals are known to adapt their scams to take advantage of the latest crisis and the Covid-19 coronavirus pandemic has been no different. Throughout the pandemic, criminals... More

Six Cyber Threats at Play During the Pandemic (Racontuer)

Opportunism is the bread and butter of cyber-attackers. Would-be malicious actors riff on the zeitgeist, exploiting predominant hopes, fears or uncertainties to breach defenses. An... More

Why Cyber Ranges are Effective to Train Your Teams (Security Intelligence)

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that ... More

Salesforce Chief Trust Officer: Cybersecurity Basics More Important Than Ever in the New Normal of Remote Work (ZDNet)

Jim Alkove, Chief Trust Officer at Salesforce, talks security in the new normal of remote work, cybersecurity best practices, and how security jobs can be a way to increase diversi... More

A Return to On-Site Security Assessments in Europe (CDSA)

Convergent Risks announced it was seeing a scheduled return to ‘On-Site’ operations across Europe. Convergent CEO Chris Johnson said: “We are delighted to have recently sched... More

4 Evolving Technology Areas of Smart Cybersecurity (Forbes)

The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity. Smart Cybersecurity is a logical reaction to try to manage ... More

Make AI a Force Multiplier in Cybersecurity – Not a Destination (Dataconomy)

In the cybersecurity war between organizations and adversaries, we too often convince ourselves that we are pitting “technology versus technology.” But, actually, the battle is... More

Hackers Can Now Trick USB Chargers to Destroy Your Devices – This is How it Works (Forbes)

Not all cyber attacks focus on data theft. Sometimes the intent is “to achieve destruction of the physical world through digital means,” Chinese tech giant Tencent warns. The c... More

Cybersecurity Lessons from the Pandemic (Dark Reading)

There is absolutely no absolute security. Nature is designed in a way that things can and eventually will go wrong. This is true both for pandemics and cybersecurity incidents.... More

Cybersecurity Spending to Grow This Year but May be Hit by Budget Constraints (TechRepublic)

Even in the midst of the coronavirus pandemic, organizations need to focus on shoring up their cybersecurity defenses. In some ways, security is more critical now as cybercriminals... More

Akamai: Media Industry Bombarded By Credential Stuffing Attacks (CDSA)

Between January 2018 and last December, the media industry was bombarded with approximately 17 billion credential-stuffing attacks, with cybercriminals constantly testing content c... More

The Time is Now for Mobile App Protection (Irdeto Perspective)

If you have key intellectual property or data in the mobile app, the need for software protection is obvious, but there are a lot of additional reasons to apply protection. Ranging... More

Securing Your Environment While Working Remotely (Security Intelligence)

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,�... More

How to Develop Playbooks for Cybersecurity (Forbes)

A company is a lot like an ecosystem. There are a lot of working parts that create and sustain a delicate environment. Just like in nature, when a foreign object is introduced to t... More

Cybercriminals Using Commercial ‘Crypter’ to Smuggle Malware Into Cloud Storage (IT Pro Portal)

A known cybercriminal group has altered its tactics to target cloud storage services and better avoid detection, according to new research.... More

The Code War: Cyberattacks are Redrawing the Battle Lines of Global Conflict (Wired)

The difficulty of attribution, or the ability to tell who launched an attack, is part of what makes cyberattacks a compelling–and successful–tactic. Attacks might rely on third... More

Sign up for our newsletters
* indicates required
MESA Newsletters