Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an […]

The post Cybersecurity 101: What is Attack Surface Management? appeared first on Security Intelligence.

Continue reading Cybersecurity 101: What is Attack Surface Management?

The Growing Threat to Critical Infrastructure

In August 2022, the threat intelligence and cybersecurity company Cyble found 8,000 virtual network computing (VNC) instances exposed online. Additionally, this research revealed that most of these ports are in the United States, China and Sweden — putting many critical infrastructure companies at risk of attack. In an age where cybersecurity threats are omnipresent, it’s […]

The post The Growing Threat to Critical Infrastructure appeared first on Security Intelligence.

Continue reading The Growing Threat to Critical Infrastructure

What is the Future of Password Managers?

In November 2022, LastPass had its second security breach in four months. Although company CEO Karim Toubba assured customers they had nothing to worry about, the incident didn’t inspire confidence in the world’s leading password manager application. Password managers have one vital job: keep your sensitive login credentials secret, so your accounts remain secure. When hackers […]

The post What is the Future of Password Managers? appeared first on Security Intelligence.

Continue reading What is the Future of Password Managers?

How the US Government is Fighting Back Against Ransomware

As ransomware-related payments surged toward $600 million in the first half of 2021, the U.S. government knew it needed to do more to fight back against cyber criminals. For many years, the Treasury’s Office of Foreign Assets Control (OFAC) had a Specially Designated Nationals and Blocked Persons List (SDN List for people or organizations acting […]

The post How the US Government is Fighting Back Against Ransomware appeared first on Security Intelligence.

Continue reading How the US Government is Fighting Back Against Ransomware

Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line

In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty line’ grows wider. That poses a threat to all companies.  What is the cyber poverty […]

The post Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line appeared first on Security Intelligence.

Continue reading Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line

Black Hat SEO: Is Someone Phishing With Your Site Domain?

Search engine optimization (SEO) is a long game. Improving your website to rank higher on search engine results pages helps you attract more traffic. Plus, it helps build a trustworthy reputation. But, some people want to take shortcuts by using what’s known as black hat SEO. If this happens, your business could pay the price. […]

The post Black Hat SEO: Is Someone Phishing With Your Site Domain? appeared first on Security Intelligence.

Continue reading Black Hat SEO: Is Someone Phishing With Your Site Domain?

Everything CISOs Need to Know About NIST

It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020. Without a plan, maintaining a robust security posture is an uphill struggle.  Thankfully, the National Institute of Standards and Technology (NIST) offers CISOs the guidance they need. Read on to learn […]

The post Everything CISOs Need to Know About NIST appeared first on Security Intelligence.

Continue reading Everything CISOs Need to Know About NIST

Identity Fraud: 9 Consumer Scams (and How to Stop Them)

With remote work, e-commerce activity and sophisticated breach capabilities at an all-time high, there is a perfect storm brewing. Identity fraud is not going away anytime soon.  Take a look at nine common types of identity fraud, the warning signs and some identity management advice. This way, you can reduce the risk of falling victim […]

The post Identity Fraud: 9 Consumer Scams (and How to Stop Them) appeared first on Security Intelligence.

Continue reading Identity Fraud: 9 Consumer Scams (and How to Stop Them)

Cyber Warfare: What To Expect in 2022

Cyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled with security flaws that make it an unfortunate reality. Digital transformation has brought great convenience to consumers with mobile apps and e-commerce. And the evolution […]

The post Cyber Warfare: What To Expect in 2022 appeared first on Security Intelligence.

Continue reading Cyber Warfare: What To Expect in 2022

Database Security Best Practices: The Essential Guide

In 2021, an F-35 fighter jet is more likely to be taken out by a cyberattack than a missile. In the digital age, the threat of an attack is everywhere and constantly growing. If your company or agency fails to adhere to database security best practices, you risk a lot. Items at risk include your […]

The post Database Security Best Practices: The Essential Guide appeared first on Security Intelligence.

Continue reading Database Security Best Practices: The Essential Guide