Token Resistance: Tackling the New NFT Threat Landscape

Nonfungible tokens (NFTs) are big business — but come with significant cyber- and crypto-security risk. Part of the problem is that the NFT landscape is poorly understood. They also make up part of a massively overpriced blockchain-based network that could open the door to new security threats. So, how do companies prepare for the coming […]

The post Token Resistance: Tackling the New NFT Threat Landscape appeared first on Security Intelligence.

Continue reading Token Resistance: Tackling the New NFT Threat Landscape

How to Reduce Zero Trust Frustration By Capturing Context

Zero trust remains one of the best ways for companies to reduce total risk. By knowing the potential risk of any request — both inside and outside the enterprise network — rather than assuming good intentions, companies can limit potential attacks. Deploying a zero trust framework at scale, however, may cause frustration. It increases operational […]

The post How to Reduce Zero Trust Frustration By Capturing Context appeared first on Security Intelligence.

Continue reading How to Reduce Zero Trust Frustration By Capturing Context

Progressive Web Apps and Cookies: Taking a Bite Out of Security

To prevent cookie theft, have cyber defense baked in. With progressive web apps (PWA) and other relatively new protective efforts in place, how can you be sure you’re defending against today’s attackers? Here’s what enterprise needs to know about the rumbling threat of pass-the-cookie attacks, how current cloud and mobile frameworks like PWAs can empower […]

The post Progressive Web Apps and Cookies: Taking a Bite Out of Security appeared first on Security Intelligence.

Continue reading Progressive Web Apps and Cookies: Taking a Bite Out of Security

Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors. As a result, it’s worth taking stock of current security systems and services to see what’s working, what isn’t and where operations can be improved. But how do businesses begin? […]

The post Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan appeared first on Security Intelligence.

Continue reading Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

Cybersecurity Trends and Emerging Threats in 2021

The year 2021 is finally here, bringing with it the promise of a brighter future — but a long road ahead. In this piece, we’ll dive into five cybersecurity trends that pose significant potential risk in 2021 and offer practical advice to help entities reduce overall risk. The first quarter of 2021 represents a cybersecurity […]

The post Cybersecurity Trends and Emerging Threats in 2021 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends and Emerging Threats in 2021

Solving 5 Challenges of Contact Tracing Apps

Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the spread and mitigate the impact of COVID-19 at scale. Despite good intentions, the push for […]

The post Solving 5 Challenges of Contact Tracing Apps appeared first on Security Intelligence.

Continue reading Solving 5 Challenges of Contact Tracing Apps

AI Security: Curation, Context and Other Keys to the Future

Security leaders need to cut through the hype when it comes to artificial intelligence (AI) security. While AI offers promise, buzzwords and big-picture thinking aren’t enough to deliver practical, useful results. Instead, using AI security correctly starts with knowing what it looks like today and what AI will look like tomorrow. Improved curation, enhanced context […]

The post AI Security: Curation, Context and Other Keys to the Future appeared first on Security Intelligence.

Continue reading AI Security: Curation, Context and Other Keys to the Future

Thinking Outside the Dox: What IT Security Can Learn From Doxing

Doxing is rightfully regarded as a dangerous threat, potentially exposing personal information where it shouldn’t be. But, defenses derived from doxing may strengthen corporate cybersecurity at scale.  Doxing is the dark side to widespread data dispersal and discovery. Data is leveraged to harm individuals or organizations, often as retaliation for real or perceived slights. As […]

The post Thinking Outside the Dox: What IT Security Can Learn From Doxing appeared first on Security Intelligence.

Continue reading Thinking Outside the Dox: What IT Security Can Learn From Doxing

Security-First Culture: Break Company Barriers With a Language That Works

A security-first culture means conveying cybersecurity needs throughout the enterprise, but it isn’t easy to maintain. Communication can be hard no matter who you’re working with. For many IT teams, the profit-and-loss conversation doesn’t come naturally. But these teams need to communicate with executives in order to get the resources they need to protect the […]

The post Security-First Culture: Break Company Barriers With a Language That Works appeared first on Security Intelligence.

Continue reading Security-First Culture: Break Company Barriers With a Language That Works

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Financial firms continue to move to digital-first deployments, as retail branches close, and people shift to remote work. This shift makes understanding and preventing even common darknet, or dark web, threats a priority. Financial cybersecurity investment institutions need to understand what the dark web is, provide their security teams with the tools to explore it […]

The post Darknet Cybersecurity: How Finance Institutions Can Defend Themselves appeared first on Security Intelligence.

Continue reading Darknet Cybersecurity: How Finance Institutions Can Defend Themselves