For Attackers, Home is Where the Hideout Is

Remember the good ol’ days of playing hide-and-seek? It’s hard to forget the rush of finding the perfect hiding place. I remember crouching into a tiny ball behind the clothes hanging in my mother’s closet, or standing frozen like a statue behind the curtain of our living room window. While it was “just a game” […]

The post For Attackers, Home is Where the Hideout Is appeared first on Security Intelligence.

Continue reading For Attackers, Home is Where the Hideout Is

Autonomous Vehicle Security Needs From A Hacker’s Perspective

With connected cars becoming more common, the industry has more standards and options when it comes to autonomous vehicle security.  Adam Laurie, known in hacker circles as Major Malfunction, leads X-Force Red’s automotive testing practice. He has seen firsthand how easy it can be to compromise an autonomous vehicle if strong security processes and controls […]

The post Autonomous Vehicle Security Needs From A Hacker’s Perspective appeared first on Security Intelligence.

Continue reading Autonomous Vehicle Security Needs From A Hacker’s Perspective

A Recipe for Reducing Medical Device Internet of Things Risk

You may recall this blog post from March 2020. It highlighted the importance of factoring in clinical, organizational, financial and regulatory impact when determining which medical Internet-of-Things (IoMT) security vulnerabilities should be fixed first. Consider this post a part two. Whereas the previous post focused on the fact that IoMT devices are here to stay […]

The post A Recipe for Reducing Medical Device Internet of Things Risk appeared first on Security Intelligence.

Continue reading A Recipe for Reducing Medical Device Internet of Things Risk

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology […]

The post Securing Your Environment While Working Remotely appeared first on Security Intelligence.

Continue reading Securing Your Environment While Working Remotely

Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to minimize risk?

The post Take a Bite Out of Sweyn appeared first on Security Intelligence.

Continue reading Take a Bite Out of Sweyn

Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Due to legal regulations, internal policies, executive requests, and the desire to beat threat actors and avoid breaches, penetration testing is becoming a common practice.

The post Ad Hoc or Managed Penetration Testing: Which One Is Best for You? appeared first on Security Intelligence.

Continue reading Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Measuring Security Risk in a Medical IoT World

To reduce cybersecurity risk, silos among internet of things (IoT) technologies and hospital teams should be broken down and impact across four pillars should be weighed.

The post Measuring Security Risk in a Medical IoT World appeared first on Security Intelligence.

Continue reading Measuring Security Risk in a Medical IoT World

To Rank or Not to Rank Should Never Be a Question

Scanning is an important part of any vulnerability management program, but it should always be accompanied by vulnerability ranking to ensure teams are patching the most impactful issues first.

The post To Rank or Not to Rank Should Never Be a Question appeared first on Security Intelligence.

Continue reading To Rank or Not to Rank Should Never Be a Question

Containers in the Cloud: False Assumptions and Security Challenges

Strengthening container security in the cloud starts with addressing the misconception that containers automatically provide security for the applications inside them.

The post Containers in the Cloud: False Assumptions and Security Challenges appeared first on Security Intelligence.

Continue reading Containers in the Cloud: False Assumptions and Security Challenges

Why Fixing Security Vulnerabilities Is Not That Simple

When it comes to patching, the devil is in the details. Help the process along by understanding these five issues organizations commonly face between scanning and finding security vulnerabilities.

The post Why Fixing Security Vulnerabilities Is Not That Simple appeared first on Security Intelligence.

Continue reading Why Fixing Security Vulnerabilities Is Not That Simple