What does resilience in the cyber world look like in 2025 and beyond?

  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term “resilience” can be difficult to define, and when we define it, we […]

The post What does resilience in the cyber world look like in 2025 and beyond? appeared first on Security Intelligence.

Continue reading What does resilience in the cyber world look like in 2025 and beyond?

Cost of a data breach: Cost savings with law enforcement involvement

For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures […]

The post Cost of a data breach: Cost savings with law enforcement involvement appeared first on Security Intelligence.

Continue reading Cost of a data breach: Cost savings with law enforcement involvement

Cost of data breaches: The business case for security AI and automation

As Yogi Berra said, “It’s déjà vu all over again.” If the idea of the global average costs of data breaches rising year over year feels like more of the same, that’s because it is. Data protection solutions get better, but so do threat actors. The other broken record is the underuse or misuse of […]

The post Cost of data breaches: The business case for security AI and automation appeared first on Security Intelligence.

Continue reading Cost of data breaches: The business case for security AI and automation

Alert fatigue: A 911 cyber call center that never sleeps

Imagine running a 911 call center where the switchboard is constantly lit up with incoming calls. The initial question, “What’s your emergency, please?” aims to funnel the event to the right responder for triage and assessment. Over the course of your shift, requests could range from soft-spoken “I’m having a heart attack” pleas to “Where’s […]

The post Alert fatigue: A 911 cyber call center that never sleeps appeared first on Security Intelligence.

Continue reading Alert fatigue: A 911 cyber call center that never sleeps

Artificial intelligence threats in identity management

The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned […]

The post Artificial intelligence threats in identity management appeared first on Security Intelligence.

Continue reading Artificial intelligence threats in identity management

Hypervisors and Ransomware: Defending Attractive Targets

With every step towards better cyber defense, malicious attackers counter with new tactics, techniques and procedures. It’s not like the attackers are going to say, “All right, you made it too tough for us this time; we’re checking out.” That is not happening. Increased use of virtualization comes with both operational efficiencies and abilities to […]

The post Hypervisors and Ransomware: Defending Attractive Targets appeared first on Security Intelligence.

Continue reading Hypervisors and Ransomware: Defending Attractive Targets

Is Your Cybersecurity “Too” Good?

Emphatically, no, it isn’t. But now that we have your attention, is that even the right question? Probably not. Your security can never truly be “too good”; conversely, neither can it be “too poor,” though it is possible to have “bad” security (more on that in a moment). If security is addressed in binary modes, […]

The post Is Your Cybersecurity “Too” Good? appeared first on Security Intelligence.

Continue reading Is Your Cybersecurity “Too” Good?

What’s in Your Policy: Insurance Markets and Nation State Cyberattacks

What happens when you think you have something valuable locked away in a safe place for an emergency, only to find out it is not available when you need it? Apart from expected disappointment, panic may set in. Now, think of your insurance coverage as the “valuable something” you no longer have access to because […]

The post What’s in Your Policy: Insurance Markets and Nation State Cyberattacks appeared first on Security Intelligence.

Continue reading What’s in Your Policy: Insurance Markets and Nation State Cyberattacks

How to Defend Against Extortion Groups Like Lapsus$

The hacker group Lapsus$ (sometimes referred to as LAPSUS$ or simply Lapsus) is a relatively newer organization in the cyber arena. The group began to garner public attention in December 2021 after some successful attacks on major corporations, where even the Department of Homeland Security felt it necessary to spend more time researching this group […]

The post How to Defend Against Extortion Groups Like Lapsus$ appeared first on Security Intelligence.

Continue reading How to Defend Against Extortion Groups Like Lapsus$

What is the Future of Cyberattacks in 2030 (and Beyond)?

The year is 2030. The world is full of smart mega cities, digital surveillance is openly ubiquitous, cash transactions no longer exist, wired connections remain for only the most demanding data flows, the “Internet of Things” age is over and the “Everything is Internet” age is here, and we churn out data with every heartbeat […]

The post What is the Future of Cyberattacks in 2030 (and Beyond)? appeared first on Security Intelligence.

Continue reading What is the Future of Cyberattacks in 2030 (and Beyond)?