What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

The Amazon-owned smart home product manufacturer Ring recently announced that it’s strengthening the security of its Internet of Things (IoT) motion-detecting doorbell cameras by offering end-to-end encryption (E2EE) for streaming video footage. There’s a catch, though. Users who opt to turn on E2EE will find that they need to make major tradeoffs. Convenience and usefulness […]

The post What Video Doorbells Have to Teach Us About the Difficulties of IoT Security appeared first on Security Intelligence.

Continue reading What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Speed is of the essence in digital defense. As the latest Ponemon Institute Cost of a Data Breach Report makes clear, businesses and agencies that are able to respond to and contain an incident rapidly will save millions over their slower peers. The average total cost of a data breach increased by nearly 10%, the largest […]

The post Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up appeared first on Security Intelligence.

Continue reading Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Building Blocks: How to Create a Privileged Access Management (PAM) Strategy

Privileged access management (PAM) has long been central to a good enterprise cybersecurity strategy. However, its nature is changing. The pace of digital change is speeding up and reliance on the cloud increasing. So, businesses and agencies must develop new PAM strategies to keep up. Processes and tools that could support yesterday’s on-premises IT rarely […]

The post Building Blocks: How to Create a Privileged Access Management (PAM) Strategy appeared first on Security Intelligence.

Continue reading Building Blocks: How to Create a Privileged Access Management (PAM) Strategy

Critical Infrastructure Attack Trends: What Business Leaders Should Know

Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. […]

The post Critical Infrastructure Attack Trends: What Business Leaders Should Know appeared first on Security Intelligence.

Continue reading Critical Infrastructure Attack Trends: What Business Leaders Should Know

The Cybersecurity Ecosystem: How Did It Get So Crowded?

Peek inside any enterprise security operations center (SOC) today, and you’ll likely see a crowded and high-pressure cybersecurity ecosystem. Over the past few years, as technology evolved rapidly, attackers have developed a growing array of strategies and tactics. In response, security organizations have deployed more and more tools and point solutions, engaged with increasing numbers […]

The post The Cybersecurity Ecosystem: How Did It Get So Crowded? appeared first on Security Intelligence.

Continue reading The Cybersecurity Ecosystem: How Did It Get So Crowded?

5 Ways to Overcome Cloud Security Challenges

During the second quarter of 2020 — for the first time in history — customers worldwide spent more on public cloud systems than on investments in non-cloud IT systems. With more cloud spending than ever before, the battle for market share among the leading public cloud providers (PCPs) heated up. The same tactics major providers […]

The post 5 Ways to Overcome Cloud Security Challenges appeared first on Security Intelligence.

Continue reading 5 Ways to Overcome Cloud Security Challenges

‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

The period between Christmas and New Year’s Day has long been the time people give to charities the most, making the charities themselves attractive targets for cyber criminals. Because the events of 2020 will likely boost existing trends, nonprofit cybersecurity challenges may be greater than ever this year — even as groups find themselves with […]

The post ‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights appeared first on Security Intelligence.

Continue reading ‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

The Future of Cybersecurity: How to Prepare for a Crisis in 2020 and Beyond

When it comes to the future of cybersecurity, an ounce of prevention is worth far more than a pound of cure. According to the Ponemon Institute and IBM Security’s 2020 Cost of a Data Breach Report, enterprises that designated an incident response (IR) team, developed a cybersecurity incident response plan (CSIRP) and tested their plan […]

The post The Future of Cybersecurity: How to Prepare for a Crisis in 2020 and Beyond appeared first on Security Intelligence.

Continue reading The Future of Cybersecurity: How to Prepare for a Crisis in 2020 and Beyond

Be Prepared for Increased DDoS Attacks Ahead of Black Friday

Black Friday is prime time for distributed denial-of-service (DDoS) attacks, especially as retail goes online even more than usual in 2020. Forecasters predict e-commerce sales will soar to new heights this holiday season, increasing by as much as 35% year-over-year. This explosion in online shopping brings new challenges to retailers, including managing logistics and supply chains. […]

The post Be Prepared for Increased DDoS Attacks Ahead of Black Friday appeared first on Security Intelligence.

Continue reading Be Prepared for Increased DDoS Attacks Ahead of Black Friday

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allocated to labor. Yet, barely more than […]

The post Cybersecurity Operations: 5 Ways to Cut Costs Without Pain appeared first on Security Intelligence.

Continue reading Cybersecurity Operations: 5 Ways to Cut Costs Without Pain