How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

Digital attackers are increasingly launching sophisticated campaigns in an effort to target U.S. federal agencies and other organizations. Two recent examples demonstrate this reality. These are the SolarWinds supply chain attack and the HAFNIUM Exchan… Continue reading How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

3 Best Practices for Building Secure Container Images

Organizations are increasingly turning to containers to fuel their digital transformations. According to BMC, a 2019 survey found that more than 87% of respondents were running containers—up from 55% just two years earlier. Additionally, 90% of survey … Continue reading 3 Best Practices for Building Secure Container Images

Personal Info for More Than Half a Billion Facebook Users Leaked Online

Someone leaked the phone numbers and personal information for over half a billion Facebook users online. Alon Gal, CTO at cybercrime intelligence firm Hudson Rock, tweeted out that someone had dumped hundreds of millions of Facebook records onto a… Continue reading Personal Info for More Than Half a Billion Facebook Users Leaked Online

Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach

A security professional who assisted Ubiquiti in its response to a data breach accused the Internet-of-Things (IoT) device vendor of having downplayed the incident’s severity.
The post Whistleblower Accuses Ubiquiti of Downplaying Major Data Breac… Continue reading Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach

FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher

Cybercrime cost the American public over $4 billion in reported losses over the course of 2020, according to the FBI. In its Internet Crime Report 2020, the FBI’s Internet Crime Complaint Center (IC3) revealed that it had received 791,790 complain… Continue reading FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher

SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months

The U.S. government could take up to 18 months in its efforts to recover from the SolarWinds supply chain attack, explained the U.S. Cybersecurity & Infrastructure Security Agency (CISA).
The post SolarWinds Attacks Recovery Effort Could Take … Continue reading SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months

Why the Demand for Application Development Security Skills Is Exploding

Application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill for the year ahead. Demand is expected to increase by 164% over the next five years. Such growth would bump up the total number of job openings […]

The post Why the Demand for Application Development Security Skills Is Exploding appeared first on Security Intelligence.

Continue reading Why the Demand for Application Development Security Skills Is Exploding

Cloud Native Tools Series Part 2: Understand Your Responsibilities

As I mentioned in my first blog: traditional security just doesn’t work in the cloud. Businesses dependent on the cloud can make up for this by choosing native cloud security tools. But, they can’t do so unless they understand what aspects of cloud security they’re responsible for. The AWS Shared Security Model as a Guide Luckily, […]

The post Cloud Native Tools Series Part 2: Understand Your Responsibilities appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 2: Understand Your Responsibilities

Cloud Clarity: Adding Security and Control to the AWS Shared Responsibility Model

Have your security team members ever made a mistake in the cloud? Human error happens and it can take on many forms. But, none are as serious as failing to understand the way cloud defenses work.  If a mistake does come to mind, be reassured you’re not alone. Seven in 10 organizations suffered a public […]

The post Cloud Clarity: Adding Security and Control to the AWS Shared Responsibility Model appeared first on Security Intelligence.

Continue reading Cloud Clarity: Adding Security and Control to the AWS Shared Responsibility Model

The Shift to E-Commerce: How Retail Cybersecurity is Changing

With more people making purchases from home, now is a more important time than ever to secure your business against retail security threats. More and more customers are moving to online orders with gradual growth accelerated by five years in 2020 alone. Take a look at retail cybersecurity risks and how to protect against them. […]

The post The Shift to E-Commerce: How Retail Cybersecurity is Changing appeared first on Security Intelligence.

Continue reading The Shift to E-Commerce: How Retail Cybersecurity is Changing