How Privileged Access Management Fits Into a Layered Security Strategy

In its early stages, privileged access management (PAM) involved protecting only the passwords used for privileged accounts. But it evolved beyond that single purpose in the years that followed. Nowadays, it includes other security functions like multifactor authentication (MFA), session monitoring, proxying and user behavior analytics (UBA). Take a look at how these connect for […]

The post How Privileged Access Management Fits Into a Layered Security Strategy appeared first on Security Intelligence.

Continue reading How Privileged Access Management Fits Into a Layered Security Strategy

How Privileged Access Management Fits Into a Layered Security Strategy

In its early stages, privileged access management (PAM) involved protecting only the passwords used for privileged accounts. But it evolved beyond that single purpose in the years that followed. Nowadays, it includes other security functions like multifactor authentication (MFA), session monitoring, proxying and user behavior analytics (UBA). Take a look at how these connect for […]

The post How Privileged Access Management Fits Into a Layered Security Strategy appeared first on Security Intelligence.

Continue reading How Privileged Access Management Fits Into a Layered Security Strategy

How To Write a Good Cybersecurity Resume

A lot of cybersecurity jobs await out there for the qualified job seeker. According to Cyberseek, the United States had 464,200 cybersecurity job openings as of July 30, 2021. And with the skills gap, there are even more openings every day. But that doesn’t mean you’re guaranteed a job offer. So, how do you make […]

The post How To Write a Good Cybersecurity Resume appeared first on Security Intelligence.

Continue reading How To Write a Good Cybersecurity Resume

10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

Finding the Open Source Intelligence (OSINT) that affects your business or agency can help reduce your attack surface. You just have to find it first. Take a look at how OSINT works and how to secure it. According to the Office of the Director of National Intelligence, Open Source Intelligence (OSINT) “is publicly available information […]

The post 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software) appeared first on Security Intelligence.

Continue reading 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

How Companies Can Prepare for Botnet Attacks on APIs

Organizations aren’t slowing down in their use of application programming interfaces (APIs). According to a survey covered by DEVOPSdigest, 61.3% of organizations used more APIs in 2020 than they did a year earlier. An even greater proportion (71.3%) said they plan to use even more APIs in 2021. Another 21.2% expected to use the same […]

The post How Companies Can Prepare for Botnet Attacks on APIs appeared first on Security Intelligence.

Continue reading How Companies Can Prepare for Botnet Attacks on APIs

Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for supply chain cyberattacks. Office-Related Cyberattacks […]

The post Cyberattacks Use Office 365 to Target Supply Chain appeared first on Security Intelligence.

Continue reading Cyberattacks Use Office 365 to Target Supply Chain

Young People Are the Key to Decreasing the Skills Gap

It’s time to look at the industry skills gap differently. More and more digital native young people could potentially be coming into the industry with the right skills, but several elements block their progress. Professionals already in place need to smooth the road for them. That might involve changing some assumptions about hiring, but in […]

The post Young People Are the Key to Decreasing the Skills Gap appeared first on Security Intelligence.

Continue reading Young People Are the Key to Decreasing the Skills Gap

Why Privileged Access Management Is So Hard in the Cloud

Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM. In a July 2019 study cited by Forbes, for instance, just 1% of respondents said that they don’t use any kind of PAM. More than eight of 10 of those respondents were happy […]

The post Why Privileged Access Management Is So Hard in the Cloud appeared first on Security Intelligence.

Continue reading Why Privileged Access Management Is So Hard in the Cloud

Threat Modeling: The Key to Dealing With 5G Security Challenges

With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed […]

The post Threat Modeling: The Key to Dealing With 5G Security Challenges appeared first on Security Intelligence.

Continue reading Threat Modeling: The Key to Dealing With 5G Security Challenges

SSDF: The Key to Defending Against Supply Chain Cyberattacks

For reasons we all know, software supply chain attacks took on new meaning near the end of 2020. This hasn’t changed over this year. One of the best modern ways to combat these cyberattacks is to integrate a secure software development framework (SSDF) into a vendor’s software development life cycle (SDLC). Why is this such […]

The post SSDF: The Key to Defending Against Supply Chain Cyberattacks appeared first on Security Intelligence.

Continue reading SSDF: The Key to Defending Against Supply Chain Cyberattacks