5 Ways to Increase Password Safety

You make password decisions every week. Maybe you create a new account, reset a password or respond to a password change prompt. And each time you make a seemingly small or insignificant mistake in regard to password safety, such as not creating strong enough passwords or using the same password on multiple accounts, you increase […]

The post 5 Ways to Increase Password Safety appeared first on Security Intelligence.

Continue reading 5 Ways to Increase Password Safety

How AI Will Transform Data Security

I’ve often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security. Yes, I love the convenience of online stores suggesting the perfect items for me based on my search history, but other times it feels a bit creepy to have a pair of shoes I looked […]

The post How AI Will Transform Data Security appeared first on Security Intelligence.

Continue reading How AI Will Transform Data Security

Two (or More) Is Better Than One: Digital Twin Tech for Cybersecurity

Throughout my lifetime, I’ve wondered on many occasions how my life would have changed had I made a different decision at a critical point — picked a different college, taken a different job or moved to another town. I’ve often wished that I could watch a movie of the different outcomes before making a decision, […]

The post Two (or More) Is Better Than One: Digital Twin Tech for Cybersecurity appeared first on Security Intelligence.

Continue reading Two (or More) Is Better Than One: Digital Twin Tech for Cybersecurity

Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

In the last hour, I’ve used my phone to take pictures of my teenagers, spy on my dogs while I was out of the house, pay my electric bill and watch a funny video. Then, while buying some new dish towels (yet another use), I used my phone as an identity document without even realizing […]

The post Are Your Employees’ Old Phone Numbers Creating Vulnerabilities? appeared first on Security Intelligence.

Continue reading Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

Cybersecurity Certifications: Take Your Career to the Next Level

As I help my two teenagers figure out what to do after high school, I wonder when a certification is better than a four-year degree. I’ve seen firsthand the pressure among their friends to invest a very large amount of money in college. Meanwhile, the teenager doesn’t really know what they want to do for […]

The post Cybersecurity Certifications: Take Your Career to the Next Level appeared first on Security Intelligence.

Continue reading Cybersecurity Certifications: Take Your Career to the Next Level

Educating the Educators: Protecting Student Data

I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell for a phishing attack, and their computer was infected with a virus. This isn’t an […]

The post Educating the Educators: Protecting Student Data appeared first on Security Intelligence.

Continue reading Educating the Educators: Protecting Student Data

How Good Transaction Security Can Make Customer Visits Easier

Every time I start to put my information into an online form, especially if it’s my credit card number or a banking transaction, I almost always pause. There was a time when I entered customer data without a second thought. Now, with the constant news of breaches and attacks, even those not in the cybersecurity […]

The post How Good Transaction Security Can Make Customer Visits Easier appeared first on Security Intelligence.

Continue reading How Good Transaction Security Can Make Customer Visits Easier

How the Rise of the Remote SOC Changed the Industry

What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working a success for their companies. While companies of all sizes are still working out the details of what the return to work looks like, the consensus […]

The post How the Rise of the Remote SOC Changed the Industry appeared first on Security Intelligence.

Continue reading How the Rise of the Remote SOC Changed the Industry

Strike First: The Benefits of Working With an Ethical Hacker

With cybersecurity attacks on the rise, companies must explore new ways to stay one step ahead of threat actors. IDG Research Services found that 78% of IT leaders are not confident in their companies’ security postures, which lead 91% of organizations to increase cybersecurity funding for 2021. As part of this increased focus, many companies are turning […]

The post Strike First: The Benefits of Working With an Ethical Hacker appeared first on Security Intelligence.

Continue reading Strike First: The Benefits of Working With an Ethical Hacker

Supply Chain Attacks: How To Reduce Open-Source Vulnerabilities

When you read that software supply chain attacks increased 42% in the first quarter of 2021 over Q4 2020, you might think the cybersecurity problem was related to the traditional supply chain. Many people think of a supply chain as boxes of products on trucks and ships. Software companies don’t ship physical CDs of their […]

The post Supply Chain Attacks: How To Reduce Open-Source Vulnerabilities appeared first on Security Intelligence.

Continue reading Supply Chain Attacks: How To Reduce Open-Source Vulnerabilities