Cyber Security

 

Is Your Company Spending Enough on Their Cybersecurity Budget? (IA)

Cyber security should be, if it isn’t already, at the very top of budget spending for companies of all sizes. With continued advances, we’re using technology in new and excitin... More

Cybersecurity Jobs: These Skills are Most in Demand and Have the Best Pay (ZDNet)

Demand for tech staff who specialise in cybersecurity is increasing rapidly, with a 15 percent increase in job ads for workers with this skill set between 2017 and 2018.... More

Interns and Social Media: A Goldmine for Hackers (Security Intelligence)

Internships are an excellent way for students and recent graduates to gain valuable work experience in industries they might consider for a full-time career. However, Generation Z�... More

11 Tips For Boosting Cybersecurity When You Have Remote Workers (Forbes)

In today’s tech-driven business world, more and more companies are hiring partially or wholly remote workforces. Workers across the globe can collaborate with others, sharing ski... More

How to Keep Your Film, TV Productions Safe in Cyberspace (Shifting Perspective)

According to the FBI, businesses in the United States lost $2.7 billion last year through data breaches. On a global scale, those losses were as much as $600 billion, and while al... More

Is Your Company Culture Seamlessly Secure – or Just Stressful? (Security Intelligence)

As cybersecurity practitioners, we all have a mental list of fundamental technological controls that everyone should be using to secure their environments. But when it comes to the... More

Cybercrime: Looking Beyond the Dark Web (Dark Reading)

Fighting cybercrime requires visibility into much more than just the Dark Web. Here's where to look and a glimpse of what you'll find.... More

Avoiding Cyberattacks While on the Road to Digital Transformation (DXC Technology Blog)

No matter where your organization may be on its digital transformation journey, beware the dangers lurking along the way. Fellow travelers down this road have been waylaid time and... More

NAGRA Extends HD Plus Agreement (BTN)

Nagra’s content protection of HD Plus is to be extended to include Smart TVs. The Swiss security firm has extended its agreement with HD Plus GmbH, the SES subsidiary that runs t... More

How to Create an Effective Cybersecurity Routine (ReadWrite)

With your business facing so many competing interests from the cost of securing new finance, your competitors, and a fast-changing market, you might think that cybersecurity is som... More

How to Fight Back Against Macro Malware (Security Intelligence)

Delivering malware, a cybercrime practice that spans every skill level and adversarial motivation, can take various forms. But all too often, malicious payloads are served up via m... More

Google’s Own Data Proves Two-Factor is the Best Defense Against Most Account Hacks (TechCrunch)

Every once in a while someone will ask me what is the best security advice. The long answer is “it depends on your threat model,” which is just a fancy way of saying what’s g... More

Why are Businesses Struggling to Fill Cybersecurity Vacancies? (CPO)

If you were to ask CIOs and CSOs which positions they have most difficulty filling, they wouldn’t respond with network engineer, system administrator, or developer. Instead, it i... More

IBM Security: Cybersecurity Threats Growing in Travel, Transportation Industries (CDSA)

IBM Security issued new research highlighting that the travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable ... More

Why Some of the World’s Top Cybersecurity Hackers are Being Paid Millions to Use Their Powers for Good (CNBC)

One of the most overwhelming problems in cybersecurity is a severe labor shortage. There simply aren’t enough people who are qualified to do cybersecurity jobs to fill all the op... More

Why Now is the Time to Develop Your Cybersecurity Career Opportunities (InfoSecurity)

It is more than just meeting the needs of the private and public sector. A qualified, certified cybersecurity professional has significantly improved earning and employment potenti... More

Security Awareness Training Should Always Lead to Changes in Behavior (Security Intelligence)

When striving for success, you must have a definite purpose — something that stands above everything else in terms of getting results. As it relates to information security and, ... More

Build a Strong Cybersecurity Posture With These 10 Best Practices (Forbes)

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnes... More

What Must Enterprises Consider Before Going on the Cybersecurity Offensive? (Verdict)

Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape. This might conjure up images of ... More

Why Cybersecurity Pros Want to Share Information to Combat Threats (Tech Republic)

Cybersecurity professionals face difficult challenges and obstacles just keeping up with the latest threats. Those challenges are especially great if security pros at organizations... More

Sign up for our newsletters
* indicates required
MESA Newsletters