CDSA News Headlines

 

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters (Security Intelligence)

Looking back at the most central characters, each brought their own unique set of skills and expertise to the Enterprise. This range of capabilities mimics the multifaceted role of... More

Illegal Streaming Services Prompt Multiple Indictments (THR)

Eight individuals behind two of the largest illegal streaming services in the U.S. have been indicted on charges of conspiring to violate federal criminal copyright law, the Depart... More

Weekend Vulnerability and Patch Report, August 25, 2019 (Citadel Information Group)

Important Security Updates Skype: Skype has released Skype 8.51.0.86. Updates are available from the program or Skype’s website.... More

How Video Became a Dangerous Delivery Vehicle for Malware Attacks (Security Intelligence)

Most employees have some awareness about malware attacks. Many probably know that you should never open an executable file from a stranger or install a thumb drive found in the par... More

DXC Technology Extends Service Management, Security Operations Capabilities With Acquisition of Syscom (CDSA)

DXC Technology announced the acquisition of Syscom, a leading ServiceNow partner, to extend the reach and scale of its security operations and service management capabilities. The ... More

EY Report: Cybersecurity Concerns Prevent Companies From Adopting New Technology (UK Tech)

A new report published by EY shows that over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster.... More

Has Your Business Considered Biometric Security? (Tech HQ)

Biometric security is often hailed an immutable solution in an age under the constant shadow of cybersecurity risks. A combination of technology and the verification of unique, phy... More

Securing and Protecting Your IoT Network (TechGenix)

Even the slightest misconfiguration or poor security practices can serve as a point of entry for cyberattacks, security breaches, and data theft. Since IoT is a network of connecte... More

Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)

IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More

Cybersecurity: 3 Ways CXOs Can Guard Against Insider Threats (TechWire Asia)

Insider threats have always posed quite a challenge to cybersecurity specialists looking to defend a company’s data and infrastructure. In the digital world, while external attac... More

Cybersecurity and Economic Uncertainty (Tech HQ)

Can society live with constantly compromised data? It’s a valid question because there’s every indication that we are doing so currently, and will continue to do so.... More

Weekend Vulnerability and Patch Report, August 18, 2019 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 32.0.0.238. Updates are available from Adobe’s website. Adobe Reader: Adobe has released version 2... More

Identity Management is Coming to the Internet of Things (DXC Technology Blog)

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonab... More

Phishers Play on Emotions to Fool Victims (Decipher)

Phishing has proven to be one of the more difficult security problems to solve, and new research from Google shows that it’s not just because humans are gullible. It turns out th... More

Package Delivery! Cybercriminals at Your Doorstep (Security Intelligence)

IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or someone�... More

AI in Cybersecurity Works, But Watch the Hype (Tech HQ)

AI and automation technologies can help businesses cope with a proliferation of cyberthreats— but watch out for the hype.... More

NAGRA’s Simon Trudelle Talks Content Protection, OTT, Data (Digital TV Europe)

"The next big thing is simply thinking beyond just content protection, to scalable service protection. This means taking a holistic approach to service protection – one that scal... More

Preparing for Quantum Computing’s Devastating Impact on Cybersecurity (Verdict)

Quantum computers are often considered the next great advance in the computing space, with potential benefits for chemistry, artificial intelligence, cryptography and a host of oth... More

Why Silicon Valley’s Programmers Must Learn to Play Devil’s Advocate With Privacy (Forbes)

Given the Valley’s long history of activism, openness and social good within its engineering ranks compared with Washington’s tradition of secrecy and mission focus, programmer... More

Industrial Cyberattacks See Huge Rise (IT Pro Portal)

Nowadays, hackers are more interested in wreaking havoc, rather than just creating malware that’s going to steal data or conduct some form of espionage. This is according to IBM�... More

Sign up for our newsletters
* indicates required
MESA Newsletters