RSA Conference 2018 Recap: Building a Foundation for Tomorrow’s Cybersecurity

At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.

The post RSA Conference 2018 Recap: Building a Foundation for Tomorrow’s Cybersecurity appeared first on Security Intelligence.

Continue reading RSA Conference 2018 Recap: Building a Foundation for Tomorrow’s Cybersecurity

How to Get the Most Out of the RSA Conference 2018

There’s something for every cybersecurity enthusiast at this year’s RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.

The post How to Get the Most Out of the RSA Conference 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of the RSA Conference 2018

Understanding the Relationship Between AI and Cybersecurity

While some observers fear a Skynet-esque future of malicious, self-aware machines, Dudu Mimran envisions a world in which AI and cybersecurity work together to keep emerging threats in check.

The post Understanding the Relationship Between AI and Cybersecurity appeared first on Security Intelligence.

Continue reading Understanding the Relationship Between AI and Cybersecurity

An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.

The post An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot appeared first on Security Intelligence.

Continue reading An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

How to Improve Cyber Literacy Within Your Organization

The quest to promote cyber literacy is as old as the internet itself, but the increasing connectedness of the technology landscape is making it more important than ever.

The post How to Improve Cyber Literacy Within Your Organization appeared first on Security Intelligence.

Continue reading How to Improve Cyber Literacy Within Your Organization

Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket

As the value of bitcoin and other cryptocurrencies skyrockets, fraudsters are developing new blockchain exploits and mining schemes to get their cut of the digital gold rush.

The post Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket appeared first on Security Intelligence.

Continue reading Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket

Beware of the Latest Punycode Attacks

In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.

The post Beware of the Latest Punycode Attacks appeared first on Security Intelligence.

Continue reading Beware of the Latest Punycode Attacks

The Benefits of Operational Risk Management

Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.

The post The Benefits of Operational Risk Management appeared first on Security Intelligence.

Continue reading The Benefits of Operational Risk Management

How Israel Became the Land of Connected Car Research and Development

With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.

The post How Israel Became the Land of Connected Car Research and Development appeared first on Security Intelligence.

Continue reading How Israel Became the Land of Connected Car Research and Development