Technology

 

Sportsbooks Turn to High-Tech to Respond to Data Breaches (SH)

Companies such as GeoComply are working with sportsbook clients to mitigate the risk of fraud.... More

Understanding the MSSP Business and Vendor Relationship (Fortinet Blog)

When managed security service providers (MSSP) evaluate a cybersecurity vendor, they usually start by reviewing the technology offerings. The vendor’s technologies often drive th... More

Identifying International Data Privacy Risks in Localization Operations (Mediartis Blog)

In today’s increasingly digital and global age, many companies in the media and entertainment sector have embraced a critical strategy for capturing new markets worldwide: conten... More

Cybersecurity Trends In 2023 That Will Directly Impact Everyday Life (CD)

The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security.... More

Why You Need Integrated Security and AIOps That Spans the Network (Fortinet Blog)

Network operations center (NOC) staff are tasked with not just keeping the network up but also keeping it working well, so users remain happy. But the more complex a network become... More

Hacking the Metaverse: Why Meta Wants You to Find the Flaws in its Newest Headsets (ZDNet)

Meta wants virtual reality devices to be safe against cyberattacks and security flaws -- that's why it's inviting hackers to get hands-on with VR headsets and more.... More

Fortinet Expands Global Secure SD-WAN Presence with New MSSP Partnerships

MSSPs continue to invest in Fortinet Secure SD-WAN for its ability to converge networking and security to build services that help solve their customers' biggest digital transforma... More

Vishing With Synthetic Voice (Richie May Blog)

Vishing social engineering phone calls are on the rise and show increasing velocity. Vishing is a type of social engineering attack where a malicious attacker calls their target to... More

Fortinet’s Ken Xie Talks About Business Momentum, Customer Trends, and Sustainability

Fortinet is at the forefront of dynamic changes in cybersecurity and networking as an industry leader for over 20 years. Fortinet's founder, Chairman of the Board, and CEO, Ken Xie... More

Protect Your iOS Devices With Cortex XDR Mobile (Palo Alto Networks Blog)

Your employees probably expect to work from anywhere, at any time they want, on any device. With the rise of remote work, users are accessing business apps and data from mobile dev... More

Convergent Gears Up for New TPN Platform

Convergent has announced that it is targeting 15 security assessors for the new TPN platform launch in February 2023. This will cover worldwide regions for site, hybrid and cloud-n... More

Palo Alto Networks Secures Nutanix Cloud Clusters for Microsoft Azure

NC2 on Azure leverages a new bare metal-as-a-service (BMaaS) offering, which is jointly engineered by Nutanix and Microsoft teams for cloud-like infrastructure consumption without ... More

Encrypting SharePoint List Columns (archTIS Blog)

As with any other method of sharing data, controlling access to SharePoint lists is crucial to security – especially if the information is sensitive... More

Snowflake and Microsoft Azure Offer Data Sovereignty to UK Users (Tech Monitor)

Snowflake has made its data cloud products available on cloud provider Microsoft Azure’s UK-based data centres to try and cater the growing demand for data sovereignty of custome... More

Qumulo Helps Customers Avoid the Complexity of Protecting Unstructured Data With Comprehensive Approach to Data Security (MTS)

Qumulo’s “Simply Secure” initiative is meant to help organizations minimize the risk of business disruption and protect their data from theft or loss with a complete suite of... More

How Will Digital Identity Work In the Metaverse? (Tech Monitor)

Agreement among tech companies on Metaverse standards, particularly as they relate to identity and interoperability, remains elusive.... More

How UK’s Police Forces Are Adopting Various Technologies to Combat the Rapid Digitisation of Criminal Activities (invenioLSI Blog)

Since the pandemic began, the impetus for change and adopting digital technology has spiralled to a whole new level. The UK public sector, especially the healthcare system, has see... More

Fastly Launches ‘Fast Forward’ Initiative to Support Open Source, Internet Infrastructure

Fast Forward is a set of broad-reaching programs designed to empower and support open source projects, nonprofit organizations, and developers in their endeavors to build great thi... More

archTIS Secures OneDefence Data Program Work Order Through KPMG Technologies (Proactive)

The $230,000 contract represents the first work order of its kind for a multi-stage program aimed at improving Australian Defense data practices.... More

A Closer Look at DDoS Attacks (Fastly Blog)

Before protecting against a Denial of Service (DOS) attack, you must understand what one is. A DoS attack is a malicious attempt to impact the availability of a targeted system. Th... More

Sign up for our newsletters
* indicates required
MESA Newsletters