Cyber Security

 

What’s the Financial Cost of Cyberattacks to Business? (Tech HQ)

A new report sheds light on the financial costs of cyberattacks, as malware and malicious insiders play an increasingly damaging role. ... More

Improve Risk Perception, Get Better Decisions (Decipher)

It is a trope within the security industry that humans are “awful” at risk management and make poor choices, when in fact, humans are rather good at making decisions, Andy Elli... More

Can Alphabet Become the Next Big Cybersecurity Vendor? (DCK)

Backstory, a nascent Alphabet cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.... More

Winning the War on Cybersecurity by Preparing Future Leaders (Forbes)

Part of the problem is that we rely on cybersecurity technologies to protect us, but we have not kept our own security awareness skills up to date. We love living in a digital worl... More

Why the CISO Should Report Direct to the CEO (Tech HQ)

As cybersecurity risk management has emerged as a top priority for companies across many industries, the role of the Chief Information Security Officer (CISO) has become an integra... More

Why Small Businesses Should Take Cybersecurity More Seriously (TechWire Asia)

It is a common assumption that small businesses do not need comprehensive cybersecurity protection — owners usually argue that there’s not much to steal. It is almost as if cri... More

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might (Security Intelligence)

With the deployment of 5G on the way — which will spark an explosion of internet of things devices everywhere — today’s Big Data era may end up as a molehill in terms of data... More

SAS Fortifies Cybersecurity Solution With ‘White Box’ AI (CDSA)

Last year's ceaseless data breaches involving once-trusted brands underscore the urgent need for organizations to reassess and reinforce their information security. SAS Cybersecuri... More

IBM X-Force Red Launches New Service for Blockchain Security Testing (CDSA)

IBM Security's team of offensive security experts, X-Force Red, announced the launch of a new blockchain testing service to help identify weaknesses and strengthen security of a wi... More

A CEO Cheat Sheet for the Cybersecurity Big One (Forbes)

Breaches have become so commonplace they feel like they've become an accepted part of business as usual, but complacency is a mistake. In the Conference Board's 2019 C-Suite survey... More

Cybersecurity is Putting Customer Trust at the Center of Competition (HBR)

If you’re selling a product, you’re now selling trust. That’s thanks to two conflicting trends. One is our increasing reliance on software across nearly every dimension of ou... More

Continuous Risk, Security, Compliance for Cybersecurity Posture Management: A Unified Approach (Forbes)

Today’s risk, security and compliance solutions are fragmented, requiring different approaches or even totally different deployments for on-premise, the cloud, containers, and en... More

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

Pay TV Can’t Leave its Head in the Clouds When it Comes to Content Security (NAGRA Blog)

Everyone from Hollywood studios to live sports broadcasters to pay-TV service providers must now leverage the power of OTT and cloud technologies to distribute content securely ove... More

Cybercriminals Make $3.25B+ a Year Using Social Media (SiliconANGLE)

As bad as content such as anti-vaccine material on Facebook Inc. or alleged suicide instruction videos on YouTube look, a new report out today details an even more nefarious use of... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

How AI-Based Cheating Tools Have Forced Video Game Companies to Innovate Security (Analytics India)

While artificial intelligence has entered the mainstream in a big way and found applications in almost every walk of life, there is one field where it has been widely used for many... More

Chatbot Implementation: Best Practice Tips from Avanade (IA)

Carlsberg is the perfect example of a traditional organisation embracing the digital. As part of this digital transformation drive, Avanade was also employed to develop and deliver... More

How Gamification Can Boost Cybersecurity (Information Age)

Using techniques derived from game-playing helps to upskill your staff so they can better cope with cyber threats. Here’s how it can be done.... More

Cyberpreneurship, a New Age Tool in Cybersecurity (Entrepreneur)

Cyberpreneruship has boomed since the past half decade, the ripples of which are only getting louder as we speak, reaching out to cover virtually every avenue existing on the Inter... More

Sign up for our newsletters
* indicates required
MESA Newsletters