Is VPN or Zero Trust Best for Remote Working Security?

For the past few decades, a corporate virtual private network (VPN) was the go-to answer for connecting to work when away from the office. It was simple, affordable and relatively secure. But debate has been brewing for several years regarding whether or not the corporate VPN security is dead — or at least not the […]

The post Is VPN or Zero Trust Best for Remote Working Security? appeared first on Security Intelligence.

Continue reading Is VPN or Zero Trust Best for Remote Working Security?

Adopting Microsegmentation Into Your Zero Trust Model, Part 1

The idea to discuss microsegmentation and zero trust came to me while reading cybersecurity articles over cellular data as I was waiting in line one day. And, I wrote this article on different devices: on my laptop connected to my home wireless network; on my tablet over Wi-Fi. Each time I switched devices or wireless […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 1 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 1

Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics

Something was very wrong at Forward Air on December 15, 2020. The company’s website was completely down. No one answered the customer service lines. Customers were waiting — and waiting — and waiting — for scheduled arrivals. And with all systems down, those customers had no way to get any information or track their packages. […]

The post Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics appeared first on Security Intelligence.

Continue reading Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics

Retail Cybersecurity: How to Protect Your Customer Data

In the early days of the pandemic, many retailers quickly launched e-commerce stores for the first time. Others expanded their offerings, such as adding online ordering with curbside pick-up. Within only a few months, the pandemic accelerated the shift to e-commerce stores by five years. This points to the need for increased retail cybersecurity.  The result […]

The post Retail Cybersecurity: How to Protect Your Customer Data appeared first on Security Intelligence.

Continue reading Retail Cybersecurity: How to Protect Your Customer Data

Don’t Speed Past Better Cloud App Security

They say you can only have two of three — fast, good and cheap. When it comes to developing cloud-based applications, I think that a fourth criteria should be added: secure. But, I honestly don’t think that this common advice to project managers who work in today’s market. Successful developers who take cloud app security […]

The post Don’t Speed Past Better Cloud App Security appeared first on Security Intelligence.

Continue reading Don’t Speed Past Better Cloud App Security

How Doxing Affects Gen Z

In the past, public and famous figures had to worry most about doxing. Two men were arrested in New York for doxing after posting home addresses and Social Security numbers of dozens of law enforcement personnel on the internet. Last year, federal prosecutors sentenced a former Senate aide for releasing personal information online about five […]

The post How Doxing Affects Gen Z appeared first on Security Intelligence.

Continue reading How Doxing Affects Gen Z

WannaCry: How the Widespread Ransomware Changed Cybersecurity

If I had polled cybersecurity experts on their way to work on May 12, 2017, most of them would have said they knew a major cybersecurity event loomed. Yet, on that day no one expected that they were walking into the perfect storm — in the form of WannaCry ransomware, the most damaging cyberattack to […]

The post WannaCry: How the Widespread Ransomware Changed Cybersecurity appeared first on Security Intelligence.

Continue reading WannaCry: How the Widespread Ransomware Changed Cybersecurity