Technology

 

Remote Working Drives Ransomware Epidemic: How ISPs Can Protect Their Business Customers (Irdeto Insights)

As if dealing with the direct effects of a global pandemic wasn’t difficult enough, over the past year many individuals, businesses and public bodies have found themselves suffer... More

A Closer Look at Splunk Security Analytics for AWS

Available exclusively in AWS Marketplace, the offering gives smaller security teams an accessible way to harness the power of Splunk. Built on the foundation of Splunk’s market-l... More

Top Reasons That Crash Livestreams (BuyDRM Blog)

Engineers are always looking for new and better ways to stream large events. Whether you're streaming a live event on Facebook or YouTube Live, or using your custom-built video str... More

Avoid Blind Spots: Is Your Incident Response Team Cloud Ready? (SI)

Let’s peel back the layers of cloud itself, and then take a look at how incident response teams must behave differently to thwart breaches in a more complex cloud environment. Fo... More

Bluescape Announces Software Integration With ShotGrid to Accelerate Creative Review Workflows

The newly enabled workflow streamlines asset management and creative review processes by connecting ShotGrid users with their content in a Bluescape virtual workspace. (more&hellip... More

Minimize Your Risk of Ransomware (Box Blog)

Cybersecurity Ventures predicts ransomware will cost its victims around $265 billion annually by 2031 with a new attack every 2 seconds. No company, big or small, is immune.... More

How to Win the War on Deepfakes (Tech Monitor)

Current approaches to detecting deepfakes are full of holes. New ideas are needed to identify and debunk fake videos.... More

Attacks on Operational Technology From IBM X-Force, Dragos Data (Security Intelligence)

The research shows that ransomware and remote access Trojans are the most common attack types against enterprise networks connected to OT networks.... More

Amateur Critical Infrastructure Attacks Growing in Frequency, Relative Severity (SI)

Low-sophistication operational technology (OT) attacks grew in frequency and relative severity over the previous few years, according to Mandiant. In doing so, they broadened the t... More

Data Security Along Every Stage of the Journey (Security Intelligence)

While most of us know how to protect data at rest (i.e., inactive data in storage, such as in databases), the other two states require more complex strategies. Let’s take a look ... More

Report: Spoofing, Spear Phishing Dominate BEC Attacks (CD)

Business email compromise attacks are dogging the enterprise, with 71% of organizations saying they experienced a spoofed email account over the past year, according to a new study... More

Splunk Debuts New Security Cloud, Security Analytics for AWS

Data-to-everything platform specialist Splunk has debuted its new cloud-based security platform Splunk Security Cloud, a data-centric modern security operations offering that provi... More

Irdeto, INVIDI Technologies Partner for Integrated Addressable Solutions

Powerful agreement speeds cutting-edge targeted advertising technology for pay-TV operators, providing opportunities for new revenue streams beyond subscriptions. (more…)... More

XDR: The Central Nervous System of Zero Trust (Security Intelligence)

If zero trust is the brain that watches out for the health of the digital body, extended detection and response (XDR) serves as the nerves that bring it information. And as the dig... More

Manufacturers are in the Crosshairs of Cybercriminals (INTRUSION Blog)

Researchers identified that the top vulnerabilities were information leakage, insufficient session expiration, cross-site scripting, insufficient transport layer protection, and co... More

Data Security is Wealth Protection (Security Intelligence)

When companies take the time to identify and understand their data, it becomes like gold. And just like gold, it needs to be protected. But protecting the sprawling data landscape ... More

Freecaster Taps BuyDRM to Secure Live, VOD Content

OTT platform operator Freecaster has tapped DRM and content security services provider BuyDRM and its KeyOS multi-DRM platform to secure both premium live and VOD content for viewe... More

NAGRA to Contribute to the Future of the Open Digital TV System in Brazil

NAGRA is now part of the Brazilian Digital TV System Forum. As a result of this joint work between the private sector and the government, the ISDB-T system (TV standard initially a... More

Increased Demand for Digital Platform Security Propels Irdeto to Strong FY2021

In the past 12 months alone, Irdeto has inked three new major customers to take advantage of its industry-leading online piracy detection (OPD) solutions, enabling them to reduce t... More

IN2CORE Completes Cloud, App Security Assessment of QTAKE Cloud With Convergent

IN2CORE and Convergent announced the completion of a cloud and application security assessment for the QTAKE Cloud video collaboration application used by thousands of film product... More

Sign up for our newsletters
* indicates required
MESA Newsletters