How to Increase Transparency and Rebuild Trust After a Data Breach

In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.

The post How to Increase Transparency and Rebuild Trust After a Data Breach appeared first on Security Intelligence.

Continue reading How to Increase Transparency and Rebuild Trust After a Data Breach

Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs

CEOs often lack security awareness because IT professionals fail to communicate risks in the context of the organization’s bottom line.

The post Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs appeared first on Security Intelligence.

Continue reading Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs

Across the Great Divide: Measuring Security Awareness Among US and UK Users

A survey revealed that while security awareness differs among users in the U.S. and U.K. in a variety of areas, both populations have a long way to go.

The post Across the Great Divide: Measuring Security Awareness Among US and UK Users appeared first on Security Intelligence.

Continue reading Across the Great Divide: Measuring Security Awareness Among US and UK Users

Estonia to Build Off-Site Data Center in Luxembourg

Pending negotiations with Luxembourg, Estonia will become the first nation to build an off-site data center in another country.

The post Estonia to Build Off-Site Data Center in Luxembourg appeared first on Security Intelligence.

Continue reading Estonia to Build Off-Site Data Center in Luxembourg

The Limits of Linguistic Analysis for Security Attribution

Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.

The post The Limits of Linguistic Analysis for Security Attribution appeared first on Security Intelligence.

Continue reading The Limits of Linguistic Analysis for Security Attribution

A Primer on Cross-Site Scripting (XSS)

XSS is a prevalent web-based exploit in which threat actors inject malicious code into webpages to compromise data or facilitate phishing scams.

The post A Primer on Cross-Site Scripting (XSS) appeared first on Security Intelligence.

Continue reading A Primer on Cross-Site Scripting (XSS)

More Mobile Apps Means More Man-in-the-Middle Attacks

Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.

The post More Mobile Apps Means More Man-in-the-Middle Attacks appeared first on Security Intelligence.

Continue reading More Mobile Apps Means More Man-in-the-Middle Attacks

Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late

To defend your infrastructure against future exploits, it’s critical to disable the insecure original version of the SMB protocol.

The post Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late appeared first on Security Intelligence.

Continue reading Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late