Cyber Security

 

How Security Teams are Turning to Decoy Networks (Tech HQ)

In cyber deception, decoys and lures offer similar benefits in their use of camouflage to keep corporate networks and their information safe. This creates an advantage that other s... More

11 Eye Opening Cybersecurity Statistics for 2019 (CPO)

It is estimated that by 2027, global spending on cyber security will reach $10 billion. In this age of IoT, where there is no escaping the internet, it is very important to underst... More

Drafting an Appropriate Cybersecurity Policy (CPO)

Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent ... More

Pulling Strategic Value Out of Your Cyberthreat Intelligence Practices (Security Intelligence)

An increasing number of companies today depend on their cyberthreat intelligence practices to stay ahead of determined attackers and an ever-expanding attack surface. In fact, 72 p... More

How Artificial Intelligence Helps Bridge the Cybersecurity Skills Gap (Security Intelligence)

The widespread shortage of skilled security operations and threat intelligence resources in security operations centers (SOCs) leaves many organizations open to the increased risk ... More

Skills Gap in Cybersecurity Must be Addressed (Business Mirror)

The global community will need more cyber-security experts as challenges on cyber security are getting bigger and becoming more complicated, according to a top official at IBM. “... More

How Cybersecurity is Turning Users Into Security Experts (Forbes)

The reality is that the culture of internet has changed so rapidly over the past twenty-five years where security today is the primary concern for developers as opposed to the mid-... More

AWS Makes Control Tower, Security Hub Generally Available (Dark Reading)

At its first AWS re:Inforce conference, Amazon Web Services announced general availability for AWS Security Hub and AWS Control Tower. The services are intended to handle security ... More

In Security, It’s Usually the Basic Stuff That Gets You – Like Passwords (Digitalist)

There are some very smart hackers out there, many of whom have access to the latest techniques and exploits. But time and again, we’ve seen that attackers don’t need to deploy ... More

Akamai, DreamHack Team for Cybersecurity (CISO Mag)

DreamHack announced a new partnership with Akamai to jointly share data security insights along with analysis on the global gaming and eSports industry. Recently, Akamai published ... More

It’s Time to Start Thinking Like a Threat Hunter (Security Intelligence)

We hear it from our customers or in conversations at trade shows all the time: It would be great to hunt cyberthreats, but there is simply not enough time or resources to pull it o... More

Defending Critical Infrastructure Data Protects Your Bottom Line, the Economy (Illumio Blog)

The shipping and energy infrastructure around us can be pretty inspiring. It reflects years of labor by our men and women, the scale of our economy, the power of our ingenuity. If ... More

Cybersecurity Recruiting: Weigh Your Options to Find the Right Strategy (Forbes)

For chief information security officers (CISOs), finding cybersecurity talent is difficult and expensive. It can seem like the greater the need, the less available the talent is. T... More

Convergent Risks Announces ‘Demonstrating Privacy Compliance’ Initiative (CDSA)

Convergent Risks announced its ‘Privacy Control Framework & Requirements for Implementation’ initiative which provides a structure for managing personal data that a business ca... More

Is AI Fundamental to the Future of Cybersecurity? (CSO)

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.... More

Microsoft: Changing Passwords No Longer Necessary (Verdict)

Microsoft has said that it no longer recommends periodic password changes, and that the practice could in fact leave users more open to hacking.... More

An Intelligence-Driven Approach to Cyber Threats (Help Net Security)

In the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvi... More

What is the Cybersecurity Tipping Point? (CMS Wire)

When it comes to security, our systems are now too complex to be successfully walled off from bad actors, and we need to adjust our approach if we want to keep innovating.... More

Smart Home Spending Will Triple by 2025, but Cybersecurity Fears Could Hold Market Back (Verdict)

Declining prices, access to 5G and increased awareness of the benefits of home automation will see the smart home market triple in value over the next five years.... More

LiveTiles Launches AI-Driven Data Security Solution with Microsoft (BNA)

Within weeks of becoming a launch partner for Microsoft's SharePoint home sites, Australian-founded LiveTiles has announced the launch of a new security platform for the Office 365... More

Sign up for our newsletters
* indicates required
MESA Newsletters