When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

Earlier this year, an enterprise security camera system maker suffered a data breach. The incident, which involved the compromise of a Jenkins server, enabled a group of attackers to bypass the company’s authorization system, including its two-factor authentication processes. Those responsible for the compromise then abused their access to release the photos and videos of […]

The post When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement appeared first on Security Intelligence.

Continue reading When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

What CISA Incident Response Playbooks Mean for Your Organization

What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a good framework for defending against ransomware and other attacks. In its executive order on ‘Improving the Nation’s Cybersecurity,’ the White House directed the Secretary of […]

The post What CISA Incident Response Playbooks Mean for Your Organization appeared first on Security Intelligence.

Continue reading What CISA Incident Response Playbooks Mean for Your Organization

What CISA Incident Response Playbooks Mean for Your Organization

What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a good framework for defending against ransomware and other attacks. In its executive order on ‘Improving the Nation’s Cybersecurity,’ the White House directed the Secretary of […]

The post What CISA Incident Response Playbooks Mean for Your Organization appeared first on Security Intelligence.

Continue reading What CISA Incident Response Playbooks Mean for Your Organization

3 Cloud Security Trends to Watch in 2022

Many organizations have cloud security on their minds going into 2022. In April 2021, for instance, Gartner predicted that global end-user spending on cloud management and security services would reach $18 million the following year. That’s a growth of 30% over the previous two years.  The forecasts discussed above raise an important question. Where exactly […]

The post 3 Cloud Security Trends to Watch in 2022 appeared first on Security Intelligence.

Continue reading 3 Cloud Security Trends to Watch in 2022

What It Takes to Build the Blue Team of Tomorrow

A good defense takes some testing. Ethical hacking involves pitting two teams together for the sake of strengthening digital security defenses. The red team attempts to bypass digital security barriers. By doing so, they reveal both misconceptions and flaws in their employer’s attack detection. Then, the blue team tries to defend against the red team’s […]

The post What It Takes to Build the Blue Team of Tomorrow appeared first on Security Intelligence.

Continue reading What It Takes to Build the Blue Team of Tomorrow

The State of Credential Stuffing Attacks

Credential stuffing has become a preferred tactic among digital attackers over the past few years. As reported by Help Net Security, researchers detected 193 billion credential stuffing attacks globally in 2020. Financial services groups suffered 3.4 billion of those attacks. That’s an increase of more than 45% year over year in that sector. In H1 […]

The post The State of Credential Stuffing Attacks appeared first on Security Intelligence.

Continue reading The State of Credential Stuffing Attacks

Cloud Security Trends: What Is Cybersecurity Mesh?

Have you heard of cybersecurity mesh? Some are calling it one of the more notable trends for cloud security and today’s other cyber concerns. So, what is it, and how does it work? The technology stack is breaking down as more people use architectures based on microservices. They’re also using blockchain and other trust models […]

The post Cloud Security Trends: What Is Cybersecurity Mesh? appeared first on Security Intelligence.

Continue reading Cloud Security Trends: What Is Cybersecurity Mesh?

5 Things New with Bug Bounty Programs

On September 29, HackerOne announced the latest version of its Internet Bug Bounty (IBB) program. This initiative helped to coordinate the discovery of more than 1,000 security weaknesses in open-source software between 2013 and 2021. HackerOne’s latest version aims to expand the reach of the program even further by pooling defenses from existing bug bounties, […]

The post 5 Things New with Bug Bounty Programs appeared first on Security Intelligence.

Continue reading 5 Things New with Bug Bounty Programs

The 5 Most Hotly Contested Security Trends and Questions

The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while missing other digital threats. This reflects just how much assumptions drive cybersecurity-related decisions. Forbes put […]

The post The 5 Most Hotly Contested Security Trends and Questions appeared first on Security Intelligence.

Continue reading The 5 Most Hotly Contested Security Trends and Questions

Ransomware Attackers’ New Tactic: Double Extortion

Need another reason to defend against ransomware instead of ending up having to find a solution other than paying it? Double extortion may be it. So, what is double extortion? When did it start? With this tactic, ransomware actors steal a victim’s data before their malware strain activates its encryption routine. They then have the […]

The post Ransomware Attackers’ New Tactic: Double Extortion appeared first on Security Intelligence.

Continue reading Ransomware Attackers’ New Tactic: Double Extortion