CDSA News Headlines

 

Cybersecurity and the Metaverse: Identifying the Weak Spots (VentureBeat)

If and when the metaverse emerges to supplant Web2, experts caution that these trends will only worsen and that the ramifications of cybercrime may, like the metaverse itself, be a... More

Devin Hill of Digital Silence Talks Cybersecurity

Devin Hill recently joined Digital Silence as Director of Digital Forensics and Incident Response. In this Q&A, Hill discusses a variety of topics related to cybersecurity.... More

5 Key Considerations for Your 2023 Cybersecurity Budget Planning (CSO)

An evolving threat landscape, regulatory requirement changes, and increases in cyber insurance are among leading factors that will impact next year's security budget.... More

FBI: Fake Cryptocurrency Apps Defrauded Hundreds of U.S. Investors (Decipher)

Cybercriminals have defrauded hundreds of U.S. investors by convincing them to download fake apps that impersonate legitimate cryptocurrency investment services, the FBI warned in ... More

Cybersecurity Isn’t an IT Risk, It’s a Business Risk (CMS Wire)

Cybersecurity risk assessment should be an integral part of the organization’s enterprise risk management program and decision-making, not a siloed operation.... More

Weekend Patch and Update Report, July 17, 2022

Microsoft Patch Tuesday: Microsoft’s Patch Tuesday released updates to address dozens of vulnerabilities, some of which are highly critical within Windows operating systems, Inte... More

Why Threat Analysis Will Continue to Play a Vital Role in Security (SI)

Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and false alarms across multiple systems com... More

BuyDRM’s KeyOS, Harmonic’s VOS360 Integrated for Streaming

Content security services firm BuyDRM’s Encryption Key API and Harmonic’s VOS 360 cloud platform have integrated to allow for seamless deployments of encrypted live and VOD str... More

NAGRA Anti-Piracy Efforts Result in 10 Arrests

Working with cloud platform Alianza, NAGRA is leveraging its anti-piracy capabilities to bring down criminal activity as part of Operation 404, an anti-piracy operation by the Braz... More

DeepFake Epidemic is Looming – And Adobe is Preparing for the Worst (Forbes)

“You can argue that the most important thing on the Internet now is authentication of content,” Adobe CEO Shantanu Narayen tells Forbes. “When we create the world's content, ... More

New Global OT, Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet Blog)

Fortinet recently released the 2022 State of Operational Technology and Cybersecurity Report. Based on a detailed survey conducted in March 2022 of more than 500 global operational... More

Is 2022 the Year of Secure Access Service Edge? (Security Intelligence)

In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps, APIs, devices and Inte... More

Tips for Managing Unstructured Data Security (archTIS Blog)

Unstructured data security should include stringent centralized access controls and protections to ensure only the right users – have access to the right content – at the right... More

Palo Alto Networks, HCL Expand Relationship to Secure Digital and Cloud Transformation for Global Customers

Palo Alto Networks will bolster HCL Technologies' suite of cloud and managed security services with a portfolio of best-in-class cybersecurity solutions. (more…)... More

As Cyber Talent Demand Heats Up, Hiring Managers Should Shift Expectations  (Cybersecurity Dive)

Companies trying to fill cybersecurity roles need to stop looking for unicorns and expand their search to qualified, but often overlooked, job candidates.... More

Towards a Proactive Threat Defense in Mobile Apps (Verimatrix Blog)

Today, proactive threat defense is not just a nice-to-have, but it is rather a necessity considering the sophistication of the adversary, easy access to tools and complexity of the... More

Companies Cannot See – or Protect – Nearly Half of All Device Endpoints (CD)

The average U.S. enterprise is running about 135,000 endpoint devices, half of which IT departments cannot observe , leaving security operations staff unable to detect threats or e... More

Weekend Patch and Update Report, July 10, 2022 (SecureTheVillage)

Important Security Updates Dropbox: Dropbox has released version 152.4.4880 for its file hosting program. Updates are available at Dropbox’s website. Google Chrome: Google... More

Synamedia and AWS: Protecting OTT Streaming With Watermarking, Disruption

Watermarking is a key component for any content protection solution that detects and disrupts video theft. Synamedia has worked hard to integrate its watermarking solution within t... More

Why Phishing Is Still the Top Attack Method (Security Intelligence)

Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email si... More

Sign up for our newsletters
* indicates required
MESA Newsletters