Cyber Security

 

Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)

With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More

Your Small Business is Not Prepared for This Cyber Nightmare (Fast Company)

Businesses with fewer than 10 employees are less likely to have ramped up their investment in cybersecurity since pandemic lockdown orders began, according to a new report. A surve... More

Identifying Cyber Vulnerabilities During a Pandemic (TechNative)

Amid the COVID-19 outbreak, the National Crime Agency in the U.K. has identified a surge in ‘coronavirus-themed’ malicious apps, websites, phishing emails and messages that see... More

Multifactor Authentication: The Next Battleground (Security Intelligence)

X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where imple... More

How Threat Actors are Adapting to the Cloud (Security Intelligence)

With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data t... More

It’s Time to Take a Fresh Look at Zero Trust (Security Intelligence)

With millions of employees across the U.S. experimenting with work-at-home scenarios for the first time, many organizations are taking a fresh look at a Zero Trust security strateg... More

Cybersecurity in the 5G Era: Nightmare or Opportunity? (Irdeto Perspective)

Cybersecurity is a bit of a conversation killer. Despite a near-universal increase in our devotion to connected devices – and a corresponding increase in our risk of attack – m... More

Why Remote Working is Making it Harder for You to Spot Phony Emails (ZDNet)

The number of phishing attacks and other email-based cyber-criminal campaigns continues to rise, with most organisations having witnessed an increase over the past year – but des... More

The Next Battle in the Cyber Arms Race (TechRadar)

A crucial response to the onset of increasingly sophisticated and novel attacks has been AI-powered defenses, a development driven by the philosophy that information about yesterda... More

The Unaddressed Gap in Cybersecurity: Human Performance (MIT Sloan)

Without addressing this issue of human performance, a vicious cycle perpetuates. As companies bring on board new technologies — each one potentially addressing an emerging threat... More

Report: 60% of Organizations to Suffer Email Borne Attacks (CISO)

A new survey revealed that nearly 60% of organizations believe that they will likely suffer from an email-borne attack in the coming year. And 77% of respondents stated that they a... More

How Cybersecurity Leaders Can Chart the Seas of Business Communication (Security Intelligence)

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages acros... More

Hurricanes, Global Tensions Shape Forrester’s 9 Security Priorities for 2020 (CIO Dive)

Security threats include bad actors exploiting flaws in home networks to climate-change induced wildfires that can put key data centers in harm's way.... More

Resolving the Cloud Security Conundrum (Digitally Cognizant Blog)

Cyber criminals are relentless in their willingness and ability to go after companies of all shapes and sizes around the globe with an ever-increasing quantity and sophistication o... More

If I Had a Million Dollars, Would I Build My Own Software Security Team? (Irdeto Perspective)

We look at how some software application publishers have defended themselves from reverse engineering by investing heavily and developing their own custom anti-analysis solutions.... More

Cyber LEAP Act Aims for Innovations Through Cybersecurity Grand Challenges (CSO)

New bill seeks to set up competitions across the U.S. to spur security breakthroughs.... More

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report (Security Intelligence)

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overal... More

Mobile Phishing Incidents are Growing, and Costing Companies Millions (Verdict)

Mobile phishing incidents targeting enterprises are on the rise, with the cost of single incidents potentially running into the hundreds of millions, according to new research.... More

Hackers Smell Blood as Crisis Exposes Cyber Vulnerabilities (Raconteur)

As the COVID-19 pandemic continues to disrupt supply chains the world over, cyber criminals will be on the prowl for vulnerable third parties as a way of gaining access to more luc... More

5 Principles for Effective Cybersecurity Leadership in a Post-COVID World (WEC)

As more people are working from home during the COVID-19 pandemic, cybersecurity operations are facing tremendous new challenges. Cybersecurity leaders, particularly Chief Informat... More

Sign up for our newsletters
* indicates required
MESA Newsletters