Cyber Security

 

Focusing on Personal Security to Strengthen Security Culture During National Cybersecurity Awareness Month (Adobe Blog)

As the security landscape grows increasingly complex and challenging, we as security leaders must do our part to evolve our security practices and educate our teams to help maintai... More

Amit Dhawan, CISO, Birlasoft: ROI in Cybersecurity is Becoming Redundant (ET CIO)

Amit Dhawan, CISO & DPO (Data Privacy Officer), Birlasoft, believes the impact of cyber breaches and changing regulatory landscape is mandating the never seen before expenditure in... More

Beyond Awareness: Create a Cyber Resilient Culture (Thrive)

No enterprise is completely immune to cyber security attacks. Instead of focusing solely on preventing attacks, organizations should ensure they are able to respond quickly, recove... More

The Future of Cybercrime: Where Are We Headed? (Security Intelligence)

By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. The study predicted this astronomical amount will be the result of a... More

Why ISPs are Getting Serious About the Smart Home Experience (Irdeto Perspective)

The Wi-Fi experience isn’t just about signal quality. As the world gets hooked on IoT devices to communicate, entertain and even monitor our home or health, consumers are increas... More

Why Just About Any Cybersecurity Incident Gives Nightmares to CXOs (TechWire Asia)

Major cybersecurity incidents give nightmares to CXOs, irrespective of who was attacked — and for good reason. When a cyberattack is successful, organizations lose credentials to... More

Implementing Privacy on Social Media (Forbes)

October is National Cyber Security Awareness month or NCSAM. During NCSAM, cybersecurity professionals share their insight with laypeople in addition to business. This insight help... More

Clever New DDoS Attack Gets a Lot of Bang for a Hacker’s Buck (Wired)

One of the trickiest things about stopping DDoS attacks is that hackers develop new variations on familiar themes. Researchers from Akamai's DDoS mitigation service Prolexic detail... More

Hammerspace Data-as-a-Service Protects, Secures Data Across the Hybrid Multi-Cloud (CDSA)

Hammerspace announced enterprise hybrid cloud services for protecting and securing data. Hammerspace, using its Data-as-a-Service platform, abstracts complex and diverse infrastruc... More

The Three Key Principles of a Digital Security Strategy (DXC Technology Blog)

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to del... More

What is Unified Threat Management? A Pragmatic Approach to Information Security (Security Intelligence)

Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will see a rise in everything from cryptojacking ... More

NAGRA’S Ivan Verbesselt Talks Scalable Service Protection for Pay TV Operators (Digital TV Europe)

"In a world where the demand for high-quality content – delivered anytime, anywhere, and on any device – is higher than ever, service providers increasingly have their work cut... More

Three Reasons Why Killing Passwords Improves Your Cloud Security (Forbes)

Because they’re porous, proliferating and turning into primary forms of digital IDs, mobile devices and their passwords are a favorite onramp for hackers wanting access to compan... More

Cyberattacks Now No. 1 Risk for Many Organizations (ITProPortal)

For businesses of all shapes and sizes, cyberattacks are now their biggest worry, according to a new report by insurance consultancy Marsh and Microsoft. The two companies polled m... More

City of Los Angeles Gets an IBM Security Cybercrime Boost (CDSA)

The city of Los Angeles and its L.A. Cyber Lab have tapped IBM Security for a new program geared toward helping local businesses collaborate to tackle cybercrime, and launch new, c... More

DNS Protection: A Must in Security Solutions for Any Company (Akamai Blog)

Domain name system (DNS) services are often a point of vulnerability for businesses, so DNS security has become a growing concern for many of them.... More

Is Your Enterprise Vulnerable to ‘Deepfake’ Technology? (DXC Technology Blog)

Deepfake audio is even easier than deepfake video (not that any deepfakes are easy; they do require some skills, time, and expense on the part of the creators). If the target is a ... More

Your Users Aren’t the Weakest Link – They’re Integral to Your Security Program (Security Intelligence)

As data breaches increase globally in both severity and frequency, business leaders are realizing that achieving better security outcomes requires a significant shift in the tradit... More

Cyberattackers Now Pose as Business Executives to Secure Security Certificates (ZDNet)

Security certificates are intended to elicit trust in users for the deployment of software, but as with so many other safeguards, threat actors can find a way to abuse the mechanis... More

How Cybersecurity Leaders Can Best Navigate the C-Suite (CPO)

While leaders acknowledge security is a vital part of their organization, they often prioritize other initiatives that provide a more direct return on investment. According to a re... More

Sign up for our newsletters
* indicates required
MESA Newsletters