Cyber Security

 

Cyberchology: Psychometric Tests are a Key Weapon in Battle Against Cybersecurity Breaches (IA)

Cyberchology: Could psychometric tests lessen vulnerability to cybersecurity breaches? New research reveals different personality types have different susceptibilities to cybercrim... More

Protecting Smart Cities (TechNative)

The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More

4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)

Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More

Survey’s Surprise Finding: Only Half of Organizations Believe They Can Stop Cyberattacks (DXC Technology Blog)

If they are being honest with you, any CISO will tell you that they are well aware of the fact that their organization can be breached. None, at least none that I know, would conte... More

The Importance of Training: Cybersecurity Awareness as a Firewall (Forbes)

The top funding priorities for chief information security officers (CISOs) in the coming year reveal a fundamental challenge facing enterprises today: They need more talent, and th... More

Staying Ahead of Insidious New Breeds of Cyberattacks (Digitalist)

The whole industry of cybercrime has become increasingly sophisticated, not to mention far more comprehensively funded. There are several new breeds you might not be aware of.... More

Why You Should Make Cybersecurity a Company Culture and How to Do It (Forbes)

Cyberattacks though commonly reported as sophisticated, often are not. They are surprisingly simple and usually financially motivated. It seems so often that the media report that ... More

Artificial Intelligence: A Tool or a Threat to Cybersecurity? (ReadWrite)

Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsi... More

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters (Security Intelligence)

Looking back at the most central characters, each brought their own unique set of skills and expertise to the Enterprise. This range of capabilities mimics the multifaceted role of... More

Box Shield Debuts With Increased Security Controls, Threat Protection (TechCrunch)

Box has always had to balance the idea of sharing content broadly while protecting it as it moved through the world, but the more you share, the more likely something can go wrong,... More

How Video Became a Dangerous Delivery Vehicle for Malware Attacks (Security Intelligence)

Most employees have some awareness about malware attacks. Many probably know that you should never open an executable file from a stranger or install a thumb drive found in the par... More

Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More

DXC Technology Extends Service Management, Security Operations Capabilities With Acquisition of Syscom (CDSA)

DXC Technology announced the acquisition of Syscom, a leading ServiceNow partner, to extend the reach and scale of its security operations and service management capabilities. The ... More

EY Report: Cybersecurity Concerns Prevent Companies From Adopting New Technology (UK Tech)

A new report published by EY shows that over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster.... More

Has Your Business Considered Biometric Security? (Tech HQ)

Biometric security is often hailed an immutable solution in an age under the constant shadow of cybersecurity risks. A combination of technology and the verification of unique, phy... More

Securing and Protecting Your IoT Network (TechGenix)

Even the slightest misconfiguration or poor security practices can serve as a point of entry for cyberattacks, security breaches, and data theft. Since IoT is a network of connecte... More

Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)

IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More

Cybersecurity: 3 Ways CXOs Can Guard Against Insider Threats (TechWire Asia)

Insider threats have always posed quite a challenge to cybersecurity specialists looking to defend a company’s data and infrastructure. In the digital world, while external attac... More

Cybersecurity and Economic Uncertainty (Tech HQ)

Can society live with constantly compromised data? It’s a valid question because there’s every indication that we are doing so currently, and will continue to do so.... More

Identity Management is Coming to the Internet of Things (DXC Technology Blog)

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonab... More

Sign up for our newsletters
* indicates required
MESA Newsletters