Technology

 

Blockchains Have a ‘Bridge’ Problem, and Hackers Know It (Wired)

Blockchain bridges are a crucial piece of the cryptocurrency ecosystem, which makes them prime targets for attacks.... More

AWS Taps Palo Alto Networks for Cloud-Native, Next-Gen Firewall (SDx Central)

The Palo Alto Networks Cloud NGFW for AWS brings together the security vendor’s firewall capabilities with the simplicity and scalability of the public cloud to secure AWS deploy... More

Cyber Extortion Surges 78% as ‘Ransomware as a Service’ Spreads (CD)

Most companies require a recovery period of more than a month following a ransomware attack, Palo Alto Networks found.... More

National Backup Day: Don’t Forget the Basics (SI)

National Backup Day is March 31, which serves as an annual reminder of the importance of backups for cybersecurity. We shouldn’t need reminders, but far too often, we overlook ba... More

The Metaverse is Coming – Here are the Cornerstones for Securing It (Microsoft Blog)

Beneath the buzz, the metaverse is arriving in both predictable and unexpected ways. Some new experiences using headsets and mixed reality will be in your face – quite literally ... More

Atos Opens New Global Next-Gen Security Operations Centre

Atos announced the opening of a new next-gen Security Operations Center in Sofia, Bulgaria, as part of the continuous expansion of its cybersecurity activities. The new centre is A... More

Friend MTS Extends Deal With United Media to Protect Premium Sports Content

Global content protection specialist Friend MTS has extended its long-standing relationship with United Media to provide anti-piracy services for Novasports channels in Greece. (mo... More

Five Multifactor Authentication Challenges for CISOs (TR)

Today's threat landscape is no different from last year; the increased sophistication of adversaries has promised that 2022 will be an equally challenging year. Chief information s... More

Irdeto Joins Terkko, the Largest Health Hub in Finland

Irdeto has joined the Terkko Health Hub, the largest health, medtech, and life science hub in Finland. As a partner of Terkko, Irdeto will offer its Connected Health portfolio to s... More

Is Anyone Doing Anything About the Explosion in Crypto Crime? (Security Intelligence)

As cryptocurrency transactions continue to grow, it’s no surprise that crypto crime has also seen a huge upswing. In 2021, illicit addresses raked in $14 billion, up nearly 80% c... More

Effective Device Security at Your Fingertips (NAGRA Blog)

Content security is not only about CAS or DRM software security. It’s a combination of different security and anti-piracy features that work together as a set of solutions to pro... More

The Risk Maturity Journey (Richie May Blog)

To enable the maturity of your risk and compliance program and enable your framework to scale with your organization’s growth, you need appropriate buy in and direction from the ... More

MwareTV Integrates Irdeto DRM at MultTV in Brazil (BTN)

The first implementation of Irdeto with MwareTV will be rolled out at shared services provider MultTV in Brazil. With Irdeto Control, MwareTV ensures support of multiple DRM format... More

What is Data-Centric Security? (archTIS Blog)

Data breaches have become the norm in the last few years, signaling it’s time for existing security systems to evolve. A data-centric security strategy shifts the approach from a... More

Irdeto, TASS Introduce Complete DRM Solution in China

Irdeto announced its collaboration with Beijing Jiangnan Tianan Technology Co. to introduce a multi-DRM solution that includes China DRM and supports all the leading commercial DRM... More

Are NFTs Being Used to Launder Money? (Fortune)

Their meteoric rise has raised some questions, particularly among those who see parallels between the current thirst for NFTs and the excitement surrounding initial coin offerings ... More

What You Need to Know About Data Encryption Right Now (SI)

You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need ... More

Cheating in Games: Everything You Always Wanted to Know About It (Irdeto Blog)

How does cheating affect honest players, game developers and the industry as a whole? And is there a solution to this problem?... More

Cloud Security: Why it Matters and How to Get it Right (Genpact Blog)

Everyone wants to keep their home safe. They lock their doors, install alarms, and maybe even get a surveillance camera – all to prevent break-ins from happening in the first pla... More

Terri Davies to Lead Motion Picture Association’s TPN Content Security Initiative (THR)

As president, Davies will lead the next stage of planned growth for the TPN, which was created in 2018 to address content security evaluation within production, postproduction and ... More

Sign up for our newsletters
* indicates required
MESA Newsletters