Access control is going mobile — Is this the way forward?

Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use […]

The post Access control is going mobile — Is this the way forward? appeared first on Security Intelligence.

Continue reading Access control is going mobile — Is this the way forward?

ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

After reading about the recent cybersecurity research by Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially impressed that ChatGPT 4 can exploit the vast majority of one-day vulnerabilities, I started thinking about what the results really mean in the grand scheme of cybersecurity. Most importantly, I wondered how a […]

The post ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive? appeared first on Security Intelligence.

Continue reading ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

New report shows ongoing gender pay gap in cybersecurity

The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary. The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the […]

The post New report shows ongoing gender pay gap in cybersecurity appeared first on Security Intelligence.

Continue reading New report shows ongoing gender pay gap in cybersecurity

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

Crisis communication: What NOT to do

Read the 1st blog in this series, Cybersecurity crisis communication: What to do When an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can […]

The post Crisis communication: What NOT to do appeared first on Security Intelligence.

Continue reading Crisis communication: What NOT to do

Cybersecurity crisis communication: What to do

Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook […]

The post Cybersecurity crisis communication: What to do appeared first on Security Intelligence.

Continue reading Cybersecurity crisis communication: What to do

 Brands are changing cybersecurity strategies due to AI threats

 Over the past 18 months, AI has changed how we do many things in our work and professional lives — from helping us write emails to affecting how we approach cybersecurity. A recent Voice of SecOps 2024 study found that AI was a huge reason for many shifts in cybersecurity over the past 12 months. […]

The post  Brands are changing cybersecurity strategies due to AI threats appeared first on Security Intelligence.

Continue reading  Brands are changing cybersecurity strategies due to AI threats

ChatGPT 4 can exploit 87% of one-day vulnerabilities

Since the widespread and growing use of ChatGPT and other large language models (LLMs) in recent years, cybersecurity has been a top concern. Among the many questions, cybersecurity professionals wondered how effective these tools were in launching an attack. Cybersecurity researchers Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang recently performed a study to […]

The post ChatGPT 4 can exploit 87% of one-day vulnerabilities appeared first on Security Intelligence.

Continue reading ChatGPT 4 can exploit 87% of one-day vulnerabilities

Water facilities warned to improve cybersecurity

United States water facilities, which include 150,000 public water systems, have become an increasingly high-risk target for cyber criminals in recent years. This rising threat has demanded more attention and policies focused on improving cybersecurity. Water and wastewater systems are one of the 16 critical infrastructures in the U.S. The definition for inclusion in this […]

The post Water facilities warned to improve cybersecurity appeared first on Security Intelligence.

Continue reading Water facilities warned to improve cybersecurity

The evolution of a CISO: How the role has changed

In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will […]

The post The evolution of a CISO: How the role has changed appeared first on Security Intelligence.

Continue reading The evolution of a CISO: How the role has changed