How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations

While we’re seeing the effects of larger, more expensive cyberattacks, those effects also ripple out into government policy. The growth of cloud security needs and products reflects the wider world in two major ways: the rise of remote work and increased U.S. federal interest. A recent executive order aims to improve the U.S. federal government’s […]

The post How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations appeared first on Security Intelligence.

Continue reading How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations

How Number Recycling Threatens Your Privacy Online

There’s a lot to think about when you or your employees get new mobile phones — plans, hardware, cost. But one thing many people don’t think about is number recycling, a common practice among providers. Take a look at how it enables some of the lesser-known cell phone cyberattacks.  What Can Someone Do with My […]

The post How Number Recycling Threatens Your Privacy Online appeared first on Security Intelligence.

Continue reading How Number Recycling Threatens Your Privacy Online

Most Digital Attacks Today Involve Social Engineering

On May 14, the FBI marked a sobering milestone: the receipt of its six millionth digital crime complaint. It took just 14 months for the FBI’s Internet Crime Complaint Center (IC3) to reach its new threshold. Digital crime complaints are on the rise, and we have some ideas as to why. Check out what these […]

The post Most Digital Attacks Today Involve Social Engineering appeared first on Security Intelligence.

Continue reading Most Digital Attacks Today Involve Social Engineering

Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

When did you last change your work password? Was it when the system prompted you? When you were first hired? Or maybe the answer doesn’t matter. When it comes to password safety, old adages don’t always apply anymore. Let’s take a look at what today’s business password management really needs by focusing on the valuable […]

The post Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient appeared first on Security Intelligence.

Continue reading Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

White House Memo Takes on Securing Critical Infrastructure Control Systems

Attacks targeting critical infrastructure have been on the rise in recent years. Back in 2019, for instance, 56% of utility professionals responsible for overseeing risk in their organizations’ operational technology (OT) assets told Siemens and the Po… Continue reading White House Memo Takes on Securing Critical Infrastructure Control Systems

Double Encryption: When Ransomware Recovery Gets Complicated

Ever hear of double extortion? It’s a technique increasingly employed by ransomware attackers. A malware payload steals a victim’s plaintext information before launching its encryption routine. Those operating the ransomware then go on to demand two ransoms — one for a decryption utility and the other for the deletion of the victim’s stolen information from […]

The post Double Encryption: When Ransomware Recovery Gets Complicated appeared first on Security Intelligence.

Continue reading Double Encryption: When Ransomware Recovery Gets Complicated

API Abuse Is a Data Security Issue Here to Stay

Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will be the most common type of attack seen in 2022. So, what problems exactly do APIs face? And what can data security defenders do about it?  Prevalent […]

The post API Abuse Is a Data Security Issue Here to Stay appeared first on Security Intelligence.

Continue reading API Abuse Is a Data Security Issue Here to Stay

API Abuse Is a Data Security Issue Here to Stay

Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will be the most common type of attack seen in 2022. So, what problems exactly do APIs face? And what can data security defenders do about it?  Prevalent […]

The post API Abuse Is a Data Security Issue Here to Stay appeared first on Security Intelligence.

Continue reading API Abuse Is a Data Security Issue Here to Stay

Thriving in Chaos: How Cyber Resilience Works

In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. Speakers at the RSA Conference 2021 talked about this in terms of maintaining cyber resilience in chaos. So, what does the buzzword ‘cyber resilience’ really mean? And why is it important to be able […]

The post Thriving in Chaos: How Cyber Resilience Works appeared first on Security Intelligence.

Continue reading Thriving in Chaos: How Cyber Resilience Works

Thriving in Chaos: How Cyber Resilience Works

In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. Speakers at the RSA Conference 2021 talked about this in terms of maintaining cyber resilience in chaos. So, what does the buzzword ‘cyber resilience’ really mean? And why is it important to be able […]

The post Thriving in Chaos: How Cyber Resilience Works appeared first on Security Intelligence.

Continue reading Thriving in Chaos: How Cyber Resilience Works