3 Strategies to overcome data security challenges in 2024

There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030. This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card […]

The post 3 Strategies to overcome data security challenges in 2024 appeared first on Security Intelligence.

Continue reading 3 Strategies to overcome data security challenges in 2024

Updated SBOM guidance: A new era for software transparency?

The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains. In December 2023, the National Security Agency (NSA) published new guidance to help organizations […]

The post Updated SBOM guidance: A new era for software transparency? appeared first on Security Intelligence.

Continue reading Updated SBOM guidance: A new era for software transparency?

How the White House sees the future of safeguarding AI

On October 30, 2023, President Biden issued an executive order (EO) to set new standards for the safety and security of Artificial Intelligence (AI). The move sets out the government’s intentions to regulate and further advance the growth of AI technology in the years ahead. Yet the question remains if it goes far enough to […]

The post How the White House sees the future of safeguarding AI appeared first on Security Intelligence.

Continue reading How the White House sees the future of safeguarding AI

The Pentagon’s 2023 cyber strategy: What you need to know

In May 2023, the Department of Defense (DoD) released an unclassified fact sheet detailing its latest cyber strategy. This latest update is another indication of the Pentagon’s intent to combat threat actors, coming fast on the heels of the 2022 National Security Strategy and the 2022 National Defense Strategy. A more complete summary of the […]

The post The Pentagon’s 2023 cyber strategy: What you need to know appeared first on Security Intelligence.

Continue reading The Pentagon’s 2023 cyber strategy: What you need to know

How credential stuffing works (and how to stop it)

In December 2022, Norton users were put on high alert after threat actors compromised the security application with a credential-stuffing attack. Norton’s security team locked down about 925,000 accounts after detecting a suspicious flurry of login attempts from Norton Password Manager users. After the investigation, news broke that the cyber criminals successfully cracked the codes […]

The post How credential stuffing works (and how to stop it) appeared first on Security Intelligence.

Continue reading How credential stuffing works (and how to stop it)

What to do about the rise of financial fraud

As our lives become increasingly digital, threat actors gain even more avenues of attack. With the average person spending about 400 minutes online, many scammers enjoy a heyday. Old impersonation scams continue to deceive people every day, as con artists and hackers are armed with advanced technologies and sophisticated social engineering tactics. According to the […]

The post What to do about the rise of financial fraud appeared first on Security Intelligence.

Continue reading What to do about the rise of financial fraud

Crypto fraud in 2023: How can security teams fight

Hackers stole $4.3 billion worth of cryptocurrency in 2022, making it the worst year on record for crypto fraud. While the government pushes for regulation in the digital coin market, cryptocurrency remains a volatile industry and a risky bet for investors and financial institutions. While decentralized finance (DeFi) aims to offer greater control to investors, […]

The post Crypto fraud in 2023: How can security teams fight appeared first on Security Intelligence.

Continue reading Crypto fraud in 2023: How can security teams fight

Secure-by-Design: Which Comes First, Code or Security?

For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price […]

The post Secure-by-Design: Which Comes First, Code or Security? appeared first on Security Intelligence.

Continue reading Secure-by-Design: Which Comes First, Code or Security?

How AIoT Will Reshape the Security Industry in 2023

The Internet of Things (IoT) has been around since 1990 — ever since John Romkey created a toaster that could be switched on over the internet. Today, 66% of North American homes have at least one IoT device, such as a smart speaker, bulb or watch. But for all their conveniences, many IoT devices are […]

The post How AIoT Will Reshape the Security Industry in 2023 appeared first on Security Intelligence.

Continue reading How AIoT Will Reshape the Security Industry in 2023

Can Zero-Knowledge Proofs Save Cryptocurrency?

Blockchain has transformed many industries, from healthcare to real estate to banking. But despite the “unhackable” hype, flaws in Blockchain technology undeniably weaken its goals of bringing greater security, transparency and privacy to the world. Between January and November 2022, hackers stole $4.3 billion worth of cryptocurrency — marking a 37% increase from 2021. It […]

The post Can Zero-Knowledge Proofs Save Cryptocurrency? appeared first on Security Intelligence.

Continue reading Can Zero-Knowledge Proofs Save Cryptocurrency?