Cyber Security

 

How to Stay Ahead of the Cybersecurity Game: Protect Your Customer Data (Forbes)

When customers trust your organization, you are expected to protect their customer data. That’s why organizations need to learn how to collect, properly utilize and eventually el... More

Why New Hires Alone Can’t Solve Your Security Troubles (Digitally Cognizant Blog)

More staff (if you can find it) does not equal better security. Reducing risk also requires automation of manual processes, especially patch management.... More

Are Your Passwords Too Complex? (Richey May Blog)

Despite advancements in biometric technologies and the use of multi-factor authentication (MFA), passwords are still today’s front-line defense when it comes to cybersecurity and... More

The Race for Data and the Cybersecurity Challenges This Creates (Forbes)

At the rate our world is moving toward techno-vation, we’ll be seeing some 27 billion connected devices on the global mainframe by 2021. All of these devices will be operating in... More

The 7 Personality Pillars of Solid Cybersecurity (Tech HQ)

Recruiting in cybersecurity? Here are some traits to look out for.... More

Cybercrime Organizations Work Just Like Any Other Business (CNBC)

Cybercriminal organizations compete with each other for customers, fight for the best project managers and even look for leaders who serve in a CEO-like role to help them stay orga... More

5 Cybersecurity Jobs With the Highest Salaries in 2019 (CIO)

Today, businesses will do anything to secure their most vulnerable assets from cyberattacks, which means salaries for top talent continue to rise.... More

Applying AI to Battle Cyber Theft (Nuxeo Blog)

In any organization there is overlooked information that is never noticed and no one ever thinks about. It includes, among other things, information captured in an image archive or... More

Five Tech Trends Driving Cybersecurity in 2019 (Avanade Insights)

When industry analyst Gartner listed its top 10 technology trends for 2019, one of the primary themes that stood out was cybersecurity. Things continue to move fast on both sides o... More

5G Will Change How We Manage Mobile Security – Here’s How to Start Preparing (Security Intelligence)

Every once in a while, a new technology is unleashed that changes our lives. The wheel, the steam engine and the internet are just some examples that had a profound effect. 5G coul... More

A Hacker’s Perspective on Faulty Threat Models for Blockchain Assets (ISE Blog)

The code might be mistake free, but that doesn’t mean an attacker can’t find security weaknesses in the system’s design.... More

Social Media Platforms Increasingly Popular With Cybercriminals (Forbes)

Because it is free, easy to use, accessible throughout much of the world, and doesn’t require identity authentication, social media offers fraudsters a way to appear legitimate, ... More

Cyberattacks are Rising Sharply, but Businesses are Less Prepared – and the Cost is Getting Eye-Watering (Verdict)

An exhaustive report of the state of cybersecurity among businesses has found that the number of companies reporting cyberattacks grew dramatically compared to the previous year �... More

Cybercrime: 25% of All Malware Targets Financial Services, Credit Card Fraud Up 200% (Forbes)

Research published on Monday paints a bleak picture for cybersecurity across the global financial services industry. According to the report, more than 25% of all malware attacks h... More

NAB 2019: A Deep Dive into ‘Deep Fakes’ (CDSA)

Film and TV companies are now facing a new era in which “deep fake” images can fool almost anybody, so content owners must take precautions to protect their brands, properties ... More

The Future of Digital Risk and Cybersecurity: A POV From West Point (Illumio Blog)

Doing cybersecurity requires some key ingredients: a talented workforce, knowledge about institution building and team building, and comfort with technology and vendor selection. T... More

ISE Research Spotlights Cryptocurrency Vulnerabilities, Theft (Technical.ly)

Baltimore-based Independent Security Evaluators has new research out that shows a vulnerability in the private keys used for transactions on the Ethereum blockchain platform, and t... More

Long Live the Password – Even if You Don’t Want It to (Security Intelligence)

The problem with passwords is they do not scale. An individual could have hundreds of passwords while privileged users could have upward of thousands of passwords. Without a system... More

Cloud Security Spend Set to Reach $12.6B by 2023 (DarkReading)

Businesses are expected to spend $12.6 billion on cloud security tools by 2023, up from $5.6 billion in 2018 and with an especially close focus on public cloud native platform secu... More

IBM: Automation is the Next Big Step in Cybersecurity (IA)

The fourth IBM cybersecurity survey reveals how unprepared companies are for a cyber attack. Despite widespread acknowledgement that a strong cyber security response plan can save ... More

Sign up for our newsletters
* indicates required
MESA Newsletters