Avoiding the Technology Upgrade? Don’t Dodge Security

Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.

The post Avoiding the Technology Upgrade? Don’t Dodge Security appeared first on Security Intelligence.

Continue reading Avoiding the Technology Upgrade? Don’t Dodge Security

Stranger Than Fiction? The Six Weirdest 2016 Data Breaches

The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.

The post Stranger Than Fiction? The Six Weirdest 2016 Data Breaches appeared first on Security Intelligence.

Continue reading Stranger Than Fiction? The Six Weirdest 2016 Data Breaches

Seasonal Employee Security Risks: Present Danger, Proactive Defense

Companies that enlist extra help during the holidays must carefully vet temporary hires and restrict access to manage seasonal employee security risks.

The post Seasonal Employee Security Risks: Present Danger, Proactive Defense appeared first on Security Intelligence.

Continue reading Seasonal Employee Security Risks: Present Danger, Proactive Defense

Talent Acquisition Marketing: Showcasing Your Brand to Score Security Standouts

Talent acquisition marketing is essential for security teams struggling to deal with the ever-widening worldwide cybersecurity skills gap.

The post Talent Acquisition Marketing: Showcasing Your Brand to Score Security Standouts appeared first on Security Intelligence.

Continue reading Talent Acquisition Marketing: Showcasing Your Brand to Score Security Standouts

Data Sabotage: The Serious Security Risk of Smart Cities

Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms.

The post Data Sabotage: The Serious Security Risk of Smart Cities appeared first on Security Intelligence.

Continue reading Data Sabotage: The Serious Security Risk of Smart Cities

Chip-and-PIN Fraud: The New Face of Credit Crime?

As companies increasingly adopt EMV technology for point-of-sale terminals, attackers are finding new ways to commit chip-and-PIN fraud.

The post Chip-and-PIN Fraud: The New Face of Credit Crime? appeared first on Security Intelligence.

Continue reading Chip-and-PIN Fraud: The New Face of Credit Crime?

3-D Printing Vulnerabilities: Build Your Own Breach?

A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.

The post 3-D Printing Vulnerabilities: Build Your Own Breach? appeared first on Security Intelligence.

Continue reading 3-D Printing Vulnerabilities: Build Your Own Breach?

Cognitive Computing Security: Journey or Destination for Travel and Hospitality Providers?

The future of the travel and hospitality industry could lie in cognitive computing security, but there are numerous challenges to first address.

The post Cognitive Computing Security: Journey or Destination for Travel and Hospitality Providers? appeared first on Security Intelligence.

Continue reading Cognitive Computing Security: Journey or Destination for Travel and Hospitality Providers?

The Quantum Security Prognosis: Remote Health Care and the Edge of the Internet

The future of the health care industry could lie in quantum security: This advanced technology has the potential to secure critical data efficiently.

The post The Quantum Security Prognosis: Remote Health Care and the Edge of the Internet appeared first on Security Intelligence.

Continue reading The Quantum Security Prognosis: Remote Health Care and the Edge of the Internet