How TikTok is reframing cybersecurity efforts

You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its […]

The post How TikTok is reframing cybersecurity efforts appeared first on Security Intelligence.

Continue reading How TikTok is reframing cybersecurity efforts

Airplane cybersecurity: Past, present, future

With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted. To improve security […]

The post Airplane cybersecurity: Past, present, future appeared first on Security Intelligence.

Continue reading Airplane cybersecurity: Past, present, future

Communication platforms play a major role in data breach risks

Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it comes to cybersecurity, communicating means more than just talking to another person; it includes any […]

The post Communication platforms play a major role in data breach risks appeared first on Security Intelligence.

Continue reading Communication platforms play a major role in data breach risks

AI hallucinations can pose a risk to your cybersecurity

In early 2023, Google’s Bard made headlines for a pretty big mistake, which we now call an AI hallucination. During a demo, the chatbot was asked, “What new discoveries from the James Webb Space Telescope can I tell my 9-year-old about?” Bard answered that JWST, which launched in December 2021, took the “very first pictures” […]

The post AI hallucinations can pose a risk to your cybersecurity appeared first on Security Intelligence.

Continue reading AI hallucinations can pose a risk to your cybersecurity

Access control is going mobile — Is this the way forward?

Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use […]

The post Access control is going mobile — Is this the way forward? appeared first on Security Intelligence.

Continue reading Access control is going mobile — Is this the way forward?

ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

After reading about the recent cybersecurity research by Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially impressed that ChatGPT 4 can exploit the vast majority of one-day vulnerabilities, I started thinking about what the results really mean in the grand scheme of cybersecurity. Most importantly, I wondered how a […]

The post ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive? appeared first on Security Intelligence.

Continue reading ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

New report shows ongoing gender pay gap in cybersecurity

The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary. The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the […]

The post New report shows ongoing gender pay gap in cybersecurity appeared first on Security Intelligence.

Continue reading New report shows ongoing gender pay gap in cybersecurity

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

Crisis communication: What NOT to do

Read the 1st blog in this series, Cybersecurity crisis communication: What to do When an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can […]

The post Crisis communication: What NOT to do appeared first on Security Intelligence.

Continue reading Crisis communication: What NOT to do

Cybersecurity crisis communication: What to do

Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook […]

The post Cybersecurity crisis communication: What to do appeared first on Security Intelligence.

Continue reading Cybersecurity crisis communication: What to do