Cyber Insurers Might Be Making the Ransomware Problem Worse

In mid-May, one of the largest insurance companies in the U.S. paid $40 million to ransomware attackers. Two people familiar with the matter told Bloomberg that the malicious actors stole an undisclosed quantity of data and then effectively locked the insurer out of its network for two weeks. The company ignored the attackers’ demands at […]

The post Cyber Insurers Might Be Making the Ransomware Problem Worse appeared first on Security Intelligence.

Continue reading Cyber Insurers Might Be Making the Ransomware Problem Worse

XDR: The Central Nervous System of Zero Trust

If zero trust is the brain that watches out for the health of the digital body, extended detection and response (XDR) serves as the nerves that bring it information. And as the digital world rapidly changes, XDR can adapt. Why is pairing XDR with zero trust the right choice? Zero Trust in a Changing World […]

The post XDR: The Central Nervous System of Zero Trust appeared first on Security Intelligence.

Continue reading XDR: The Central Nervous System of Zero Trust

What’s New in v8 of the CIS Controls

Back in 2018, the State of Security spent a lot of time going over v7 of the Center for Internet Security’s Critical Security Controls (CIS Controls). We noted at the time how the Center for Internet Security shuffled the order of requirements for many… Continue reading What’s New in v8 of the CIS Controls

Confidential Computing: The Future of Cloud Computing Security

Two years ago, a group of tech companies introduced a new roadmap for cloud computing security. Confidential computing “uses hardware-based techniques to isolate data, specific functions, or an entire application from the operating system, hypervisor or virtual machine manager, and other privileged processes,” says IEEE Spectrum. So, what sets this apart from other digital defense efforts? […]

The post Confidential Computing: The Future of Cloud Computing Security appeared first on Security Intelligence.

Continue reading Confidential Computing: The Future of Cloud Computing Security

DOJ Recovers $2.3M in Bitcoin Ransom Paid by Colonial Pipeline

Investigators recovered $2.3 million in bitcoin paid by the Colonial Pipeline Company to DarkSide following a ransomware attack in early May. On June 7, the Department of Justice (DOJ) revealed that law enforcement agencies had been tracking trans… Continue reading DOJ Recovers $2.3M in Bitcoin Ransom Paid by Colonial Pipeline

Poison in the Water: The Physical Repercussions of IoT Security Threats

I’d wager few people had ever heard of Oldsmar, Florida, prior to 2021. That all changed in February when the city made headlines. The reason? An Internet of things (IoT) security incident moved into the physical world.  A Tale of Lifted Lye Levels At 8 a.m. local time on February 5, 2021, an operator at […]

The post Poison in the Water: The Physical Repercussions of IoT Security Threats appeared first on Security Intelligence.

Continue reading Poison in the Water: The Physical Repercussions of IoT Security Threats

School Cybersecurity: How Awareness Training Removes Attackers’ Options

Keeping student data safe and maintaining information security in education are part of living in today’s world for educators. Why is it important to include data security in their work? Find an example of how to set up a school cybersecurity policy and more below. School Cyberattacks On the Rise There’s no sign that digital […]

The post School Cybersecurity: How Awareness Training Removes Attackers’ Options appeared first on Security Intelligence.

Continue reading School Cybersecurity: How Awareness Training Removes Attackers’ Options

Understanding the Cloud Security Challenges for SMBs

The events of 2020 didn’t prevent small- to mid-sized businesses (SMBs) from adopting the cloud. Impact Networking reported that SMBs’ overall cloud spending grew 6.3% between 2019 and 2020. Such growth is projected to lead more than a third (35%) of S… Continue reading Understanding the Cloud Security Challenges for SMBs

“Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Cloud misconfigurations represent something that’s plaguing many organizations’ cloud adoption efforts. For example, a 2020 report found that 91% of cloud deployments contained at least one misconfiguration that left organizations exposed to potential … Continue reading “Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Record Setting $40M Ransom Paid to Attackers

CNA, one of the largest U.S. commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that’s the largest ransom demand ever reported to … Continue reading Record Setting $40M Ransom Paid to Attackers