What Every Incident Response Plan Needs

A record number of digital attacks occurred in 2020. The FBI’s Cyber Division received as many as 4,000 complaints about digital attacks in one day early last year. That’s 400% higher than what the Cyber Division received the previous year. This growth in the volume of digital attacks underscores why you need to have an […]

The post What Every Incident Response Plan Needs appeared first on Security Intelligence.

Continue reading What Every Incident Response Plan Needs

5 Unique Online Scams and How to Defend Against Them

The possibility of an online scam can be an ever-changing problem for individuals and businesses. If someone clicks on a virus-laden email while employed in a data-heavy business, their stolen data could lead to a compromise to the business overall. Because of this, knowing what your employees might encounter in their day to day is […]

The post 5 Unique Online Scams and How to Defend Against Them appeared first on Security Intelligence.

Continue reading 5 Unique Online Scams and How to Defend Against Them

The State of Small Business Cybersecurity in 2021

Most business owners are overconfident about their small business cybersecurity postures. Two-thirds of senior-level decision-makers who participated in a 2019 survey said they didn’t believe the small- to mid-sized businesses (SMBs) for which they’re responsible would fall victim to a digital attack. Within this prevailing view, many respondents didn’t view small business cybersecurity as important. […]

The post The State of Small Business Cybersecurity in 2021 appeared first on Security Intelligence.

Continue reading The State of Small Business Cybersecurity in 2021

User Behavior Analytics: What It Is and How It Advances Digital Security

Organizations are struggling to pinpoint threats that come from real user accounts. Take insider threats, as an example. In a 2020 report, 68% of IT and security experts felt their employers were somewhat or very at risk to insider attacks. Over half (53%) said it had become at least somewhat harder to detect an insider attack […]

The post User Behavior Analytics: What It Is and How It Advances Digital Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: What It Is and How It Advances Digital Security

Social Engineering: How to Keep Security Researchers Safe

Attacking the very people who work on stopping threat actors may seem like a bad idea. But some threat groups do go after people who’ve made a career doing vulnerability research. We’ll take a look at a recent social engineering attack campaign targeted at cyber defense experts. How can you and your employees avoid falling […]

The post Social Engineering: How to Keep Security Researchers Safe appeared first on Security Intelligence.

Continue reading Social Engineering: How to Keep Security Researchers Safe

DevSecOps: Closing the Security Gap With Developers

We talk a lot about building a culture in which every employee and department puts digital safety first. Everyone pitching in a little bit means the job gets done more thoroughly. Bringing developers, IT operations and security together in a DevSecOps format helps do that. It includes both processes and culture shifts, all of which […]

The post DevSecOps: Closing the Security Gap With Developers appeared first on Security Intelligence.

Continue reading DevSecOps: Closing the Security Gap With Developers

Penetration Testing 101: What You Need to Know

On the digital battleground, enterprises need a way to make sure their defenses work. Penetration testing (or ‘pen testing’) offers the type of attack you might encounter, but in a controlled case. With pen testing, people intentionally attack an app or network to check on its security posture. This lets enterprises realistically test the effectiveness […]

The post Penetration Testing 101: What You Need to Know appeared first on Security Intelligence.

Continue reading Penetration Testing 101: What You Need to Know

Why Automation and Zero Trust Go Hand-in-Hand

Zero trust can reshape how businesses approach digital security. The idea is to distrust by default, regardless of whether the information is located inside or outside the corporate network. From there, security teams can verify devices, apps and connections on a case-by-case basis. They should also re-verify the trust of those network assets on an […]

The post Why Automation and Zero Trust Go Hand-in-Hand appeared first on Security Intelligence.

Continue reading Why Automation and Zero Trust Go Hand-in-Hand

Inside the DarkSide Ransomware Attack on Colonial Pipeline

On May 8, the Colonial Pipeline Company announced that it had fallen victim to a ransomware attack a day earlier. The pipeline operations include transporting 100 million gallons of fuel daily to meet the needs of consumers across the entire easte… Continue reading Inside the DarkSide Ransomware Attack on Colonial Pipeline

How a Firewall Can Foster Zero Trust

Older perimeter-based firewalls aren’t up to the task of safeguarding today’s more distributed networks. But that doesn’t mean the end of the firewall is in sight. On the contrary, businesses and other groups are turning to next-generation firewalls (NGFWs) hosted in the cloud to fulfill their evolving security needs. These ‘virtual’ firewalls can be even […]

The post How a Firewall Can Foster Zero Trust appeared first on Security Intelligence.

Continue reading How a Firewall Can Foster Zero Trust