Technology

 

Wasabi Partners with Leading Security Providers to Deliver Next-Gen Cloud Storage to Australia, New Zealand Surveillance Industry

Wasabi announced partnerships with leading security providers in Australia and New Zealand, Channel Ten and Visium Networks, to deliver cost-effective, fast and scalable cloud stor... More

New Poll Reveals Washingtonians Want Stronger Online Protections for Kids and Teens

A new poll finds that Washington state residents have strong concerns about the risks that social media platforms pose to children's well-being and privacy. The survey of 596 Washi... More

Unlocking Super Aggregation: The Crucial Role of Certification in RDK (Irdeto Insights)

We look at certification and its pivotal role, within the context of RDK. We aim to shed light on why certification is crucial for enabling pay-TV operators to successfully deploy ... More

OpSec: Everything You Ever Wanted to Know About Identity Assets

This topic will explore the changing role of brand identity and why digitalization is amplifying its complexity and moving it into new environments, as well as how OpSec and Zacco ... More

CommScope, STMicroelectronics Make Matter Provisioning for IoT Devices Secure and Easy

CommScope announced the integration of CommScope’s PKIWorks IoT security platform with ST’s popular STM32WB microcontroller unit. This integrated solution offers device manufac... More

Fortinet Shifts Focus to Security Operations, SASE Amid Secure Networking Slowdown

In response to the slowdown that’s been seen in the secure networking market, Fortinet has decided to shift its marketing and sales team's focus towards the faster-growing securi... More

Better Security at the Flick of a (Compiler) Switch: Enabling Pointer Authentication and Branch Target Identification (Arm Blog)

Technology is on course to become ever more entrenched in every aspect of our daily lives, with increasing data points and connectivity providing life-changing but complex digital ... More

Bridging the Gap: Overlapping Controls in SOC 2 Attestations and NIST Cybersecurity Framework (Richey May)

In today’s rapidly evolving data security landscape, organizations face the challenge of protecting sensitive information while adhering to multiple frameworks and standards. Two... More

How Fastly Protects its Customers From Massive DDoS Threats Including the Rapid Reset Attack

Customer traffic on Fastly is not vulnerable to the massive Rapid Reset DDoS attacks that have been recently disclosed. At the initial onset of the Rapid Reset DDoS activity Fastly... More

Edgio Introduces Enterprise Protect and Perform Bundles to Secure, Accelerate Applications with Predictable Cost

Edgio announced the availability of its enterprise-level Protect and Perform Applications Bundles, a solution that combines Tier-1 web performance capabilities with a full-spectrum... More

Generative AI an Emerging Risk as CISOs Shift Cyber Resilience Strategies (IW)

Taking a long-term view of GenAI will ensure companies continue to get the benefits while staying on top of its risks.... More

Disaster Recovery: How the Cloud Can Save Your Media Supply Chain (Ateliere Blog)

Media companies have gradually adapted to deliver more content to more platforms, to find ways to better monetize their catalogs and to compete in an ever changing market. With the... More

Irdeto and Platform Science Collaborate to Improve Driver Efficiency

Through the partnership with Irdeto, the fleets will have access to Keystone, the only digital key solution in the market for commercial fleets, which will be fully integrated with... More

Microsoft Launches AI Content Safety Service (Computerworld)

The service includes text and image detection and identifies content that Microsoft terms “offensive, risky, or undesirable,” including profanity, adult content, gore, violence... More

Securing FAST Channels: Why and Ways to Safeguard Content for Enhanced Performance (PallyCon Blog)

Offering a plethora of shows and channels without the need for a subscription, FAST channels have gained immense popularity in recent years. We delve into why unique and plagiarism... More

Why Multi-channel Monitoring at Scale is Key to Prevent Content Fraud (Friend MTS Blog)

Monitoring for stolen content ensures that a business is aware of the scale of piracy of its content, and helps inform the enforcement measures in place to stop it. Though monitori... More

GeoComply to Launch New Authentication Service Through Prophet Exchange (Gaming Insider)

The CfA is part of the Know Your Customer (KYC) process and serves as an alternative for Knowledge-Based Authentication (KBA). GeoComply has developed the product to verify identit... More

Fortinet Expands Global SASE Points-of-Presence with Google Cloud

Fortinet announced the expansion of its SASE Points-of-Presence to new locations through a partnership with Google Cloud. The partnership allows Fortinet to leverage Google Cloud�... More

Cloud Security Demand Drives Better Cyber-Firm Valuations — and Deals (DarkReading)

Cisco's $28 billion purchase of Splunk was the biggest story, but there were other big security acquisitions and investments during a richer-than-expected quarter.... More

Fortinet Launches New High-Performance Switches to Securely Connect the Modern Campus

These switches support the growing connectivity and security needs of the campus with high performance, embedded intelligence, and seamless integration with Fortinet’s AIOps mana... More

Sign up for our newsletters
* indicates required
MESA Newsletters