‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

The phrase ‘future-proof’ is seductive. We want to believe technology prepares us for the future. But with threat actors and developers in an arms race to breach and protect, cybersecurity risk — and cybersecurity risk management — are always changing. As a recent report by World Economic Forum shows, businesses and other entities should know […]

The post ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving appeared first on Security Intelligence.

Continue reading ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

Cybersecurity Gaps and Opportunities in the Logistics Industry

Shipping and logistics is, in many ways, the backbone of our lives and businesses. What business doesn’t benefit from fresh food or a timely delivery? Unfortunately, this industry is open to cyberattacks just like anyone else. Luckily, groups in the trucking and logistics industry aren’t powerless to address these challenges. Check out how you can […]

The post Cybersecurity Gaps and Opportunities in the Logistics Industry appeared first on Security Intelligence.

Continue reading Cybersecurity Gaps and Opportunities in the Logistics Industry

Manufacturing Cybersecurity Threats and How To Face Them

With manufacturing cybersecurity threats on the rise, what should companies know about protecting their digital assets in the future?  Risks to Security in Manufacturing The number of ransomware incidents involving the manufacturing sector increased 156% between the first quarters of 2019 and 2020. Later in 2020, ransomware actors demanded $17 million from a laptop maker […]

The post Manufacturing Cybersecurity Threats and How To Face Them appeared first on Security Intelligence.

Continue reading Manufacturing Cybersecurity Threats and How To Face Them

Kia Motors America: Ransomware Not Behind Extended Systems Outage

Kia Motors America stated that a ransomware attack was not the apparent cause of an extended systems outage affecting the automobile dealer’s IT systems. It all started with an error message…
The post Kia Motors America: Ransomware Not Behind Exte… Continue reading Kia Motors America: Ransomware Not Behind Extended Systems Outage

Braced for Impact: Fostering Good Cloud Security Posture Management

Starting off on the right foot in digital defense today means having good Cloud Security Posture Management (CSPM). Although it can be challenging to adopt, this set of strategies and tools manages and orchestrates cloud security in ways other tactics don’t. It shows gaps might arise between organizations’ stated cloud defense policies, their actual posture […]

The post Braced for Impact: Fostering Good Cloud Security Posture Management appeared first on Security Intelligence.

Continue reading Braced for Impact: Fostering Good Cloud Security Posture Management

Global Law Firm Attributes Data Breach to Compromise at File Sharing Provider

An international law firm attributed a data breach to a compromise at a cloud solutions company that provides file-sharing services. According to the Wall Street Journal, a threat actor claimed to have stolen data from global law firm Jones Day an… Continue reading Global Law Firm Attributes Data Breach to Compromise at File Sharing Provider

Network Segmentation Series: What is It?

This is the first in a series of three blog posts about network segmentation.  Many businesses are looking to augment their defenses by changing their approach to network security. Take the heightened awareness around building zero trust networks, for instance. Embracing the shift to zero trust will require users to address the threat of lateral movement. […]

The post Network Segmentation Series: What is It? appeared first on Security Intelligence.

Continue reading Network Segmentation Series: What is It?

Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

If you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall prey to phone authentication scams. That’s not to say 2FA itself is a problem. You should keep using it, and many groups have turned […]

The post Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams appeared first on Security Intelligence.

Continue reading Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

Boost Your Organization’s Digital Security With Zero Trust

Organizations are increasingly creating zero trust policies to augment their digital security postures. According to Infosecurity Magazine, 15% of organizations say they implemented a zero trust policy by the end of 2019. An additional 59% of participants revealed their intention to create a policy of their own within the next 12 months. To understand why […]

The post Boost Your Organization’s Digital Security With Zero Trust appeared first on Security Intelligence.

Continue reading Boost Your Organization’s Digital Security With Zero Trust

Attacker Hacked into Florida City’s Water Treatment Plant, Attempted to Poison Water Supply

An attacker hacked into a Florida city’s water treatment plan and attempted to leverage that access to poison the municipality’s water supply.  According to WTSP-TV, an operator at the water treatment plan in the 15,000-person City of Oldsmar, Florida … Continue reading Attacker Hacked into Florida City’s Water Treatment Plant, Attempted to Poison Water Supply