Cyber Security

 

Measuring the Effectiveness of AI in the SOC (Security Intelligence)

According to ISACA’s State of Cybersecurity Report, 78 percent of respondents expect the demand for technical cybersecurity roles to increase in the future. The report also menti... More

States Plead for Cybersecurity Funds as Hacking Threat Surges (The Hill)

Cash-short state and local governments are pleading with Congress to send them funds to shore up their cybersecurity as hackers look to exploit the crisis by targeting overwhelmed ... More

Use of Cloud Collaboration Tools Surges and so do Attacks (CSO)

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.... More

What the Data is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic (Security Intelligence)

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. I... More

How Offensive AI Will Augment Cyberattacks (Verdict)

The mind of an experienced and dedicated cybercriminal works like that of an entrepreneur: the relentless pursuit of profit guides every move they make. At each step of the journey... More

Three Steps to Rethink Your Cybersecurity Strategy for the New World (Avanade Insights)

To respond to the COVID-19 pandemic, many organizations have had to implement new, unfamiliar operating models and quickly deploy technologies that support this new environment to ... More

Why Security Orchestration, Automation, Response is Fundamental to a Security Platform (Security Intelligence)

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams that were already struggling with too many tools ... More

Zero Trust for Maximum Security in a COVID World (Thrive)

While companies face myriad challenges during this time, it is critical that C-level executives keep security top of mind. The reason? COVID-19 has brought a dramatic change to the... More

How Decentralization Can Help Close the Cybersecurity Workforce Gap (CPO)

Beyond computing and network resources, decentralization also enables organizations to access talent and knowledge that they may not otherwise have easy access to. For cybersecurit... More

The Evolution of Enterprise Security Systems, Best Practices by Alibaba (Alibaba Cloud Blog)

For Alibaba Cloud, which provides infrastructure products, the key risk domains for cloud computing businesses include hardware, systems, networks, and user compliance. The focus a... More

4 Myths Cybersecurity Experts Want Busted (CIO Dive)

Before the coronavirus pandemic forced the workforce to work from home, employees conceded some flaws: There's a knowledge gap in security best-practices. Four in 10 employees beli... More

Why High-Profile Hacks Could Increase Amid Pandemic-Prompted Remote Work (Billboard)

Hackers are threatening to release a treasure trove of private data stolen from one of Hollywood's top talent law firms if it doesn't pay a $42 million ransom -- and experts say co... More

As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints (Dark Reading)

A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.... More

Flattening the Curve on Cybersecurity Risk After COVID-19 (Forbes)

As corporate boards and CEO’s fight the battle of their lives to keep their companies alive amongst the COVID-19 crisis, they’ve also had to stiffen their lines of defense agai... More

CISA Warnings Highlight Myriad Security Threats (Decipher)

The Cybersecurity and Infrastructure Security Agency has issued several alerts over the past week warning government agencies and other private sector organizations to be vigilant ... More

Does Your Mobile Application Hide Secrets? (Irdeto Perspective)

The COVID-19 global pandemic has forced most companies and their employees to stay home. Despite this lack of physical mobility, people are increasingly using multiple mobile devic... More

Five Ways Our Approach to Cybersecurity Could Change Post COVID-19 (Tech HQ)

The fact is, with our personal and work lives now digitized, cyber threats are one of the most real threats we face, and their scale has only magnified in a crisis which has us bot... More

Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web (Security Intelligence)

Cyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question of when, not if, and adapted security st... More

Cybersecurity Compliance Trends in a Post-Pandemic World (Forbes)

While COVID-19 may have ground most of the world to a halt, unfortunately, we can't say the same for hackers and cybercriminals. And with the majority of economists predicting a gl... More

TPN Security Experts: Global Pandemic Proves Importance of Remote Assessment Options

Just a few months ago, media and entertainment vendors could treat remote security assessments under Trusted Partner Network (TPN) guidelines as a nice-to-have option. The ongoing ... More

Sign up for our newsletters
* indicates required
MESA Newsletters