QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

Top 5 Cybersecurity Podcasts to Follow in 2022

One of my favorite parts about talking to cybersecurity professionals is asking how they landed in the industry. Few tell me about a straight path to their career, like attending college or earning a certification. Most launch into an interesting tale of their non-traditional career paths. When I share these stories, I’m often asked how […]

The post Top 5 Cybersecurity Podcasts to Follow in 2022 appeared first on Security Intelligence.

Continue reading Top 5 Cybersecurity Podcasts to Follow in 2022

Why You Need a Diversity and Inclusion Program in Cybersecurity

This is a time of major changes for businesses and agencies. That includes the move to the cloud and the shift to being digital-first. So, cybersecurity has moved to a front-and-center position in many companies and industries. When talking about security, it’s easy to focus on the tools and technologies. After all, they’re what we […]

The post Why You Need a Diversity and Inclusion Program in Cybersecurity appeared first on Security Intelligence.

Continue reading Why You Need a Diversity and Inclusion Program in Cybersecurity

Expert Insights: What’s Next for Ransomware?

Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the future. 2021 was active and interesting – for lack of a better word. There’s a lot to say in terms of cyber crime in general […]

The post Expert Insights: What’s Next for Ransomware? appeared first on Security Intelligence.

Continue reading Expert Insights: What’s Next for Ransomware?

10 Years Later, What Did LulzSec Mean for Cybersecurity?

While working on several articles on the WannaCry attacks for my job as a cybersecurity journalist, I learned about LulzSec, which ranked among the most notable attacks of the 2010s. I wanted to find out more about the group that committed major cybersecurity attacks on many household-name companies over a chaotic 50 days in 2011. […]

The post 10 Years Later, What Did LulzSec Mean for Cybersecurity? appeared first on Security Intelligence.

Continue reading 10 Years Later, What Did LulzSec Mean for Cybersecurity?

What Your Team Can Learn From the DHS Cybersecurity Hiring Program

Employees looking for cybersecurity jobs with the federal government can now use a new system and process. The Department of Homeland Security (DHS) recently launched its Cybersecurity Talent Management System (CTMS), which is more than a new system or website. The CTMS represents a new approach to hiring in the industry. Cyberattacks are on the […]

The post What Your Team Can Learn From the DHS Cybersecurity Hiring Program appeared first on Security Intelligence.

Continue reading What Your Team Can Learn From the DHS Cybersecurity Hiring Program

Cybersecurity Trends: IBM’s Predictions for 2022

After the challenging year of 2021, we look forward to what’s next in 2022. Over the past two years, we’ve seen a tremendous shift in how consumers and businesses accomplish tasks with the continued shift to digital and cloud. As a result of disappearing perimeters and increased digital data, cybersecurity attacks have, not surprisingly, increased. […]

The post Cybersecurity Trends: IBM’s Predictions for 2022 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends: IBM’s Predictions for 2022

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to […]

The post Public Wi-Fi Security: Is It Safe to Use for Business? appeared first on Security Intelligence.

Continue reading Public Wi-Fi Security: Is It Safe to Use for Business?

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to […]

The post Public Wi-Fi Security: Is It Safe to Use for Business? appeared first on Security Intelligence.

Continue reading Public Wi-Fi Security: Is It Safe to Use for Business?