Most organizations want security vendor consolidation

Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging. We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. […]

The post Most organizations want security vendor consolidation appeared first on Security Intelligence.

Continue reading Most organizations want security vendor consolidation

Lessons learned from the Microsoft Cloud breach

In early July, the news broke that threat actors in China used a Microsoft security flaw to execute highly targeted and sophisticated espionage against dozens of entities. Victims included the U.S. Commerce Secretary, several U.S. State Department officials and other organizations not yet publicly named. Officials and researchers alike are concerned that Microsoft products were […]

The post Lessons learned from the Microsoft Cloud breach appeared first on Security Intelligence.

Continue reading Lessons learned from the Microsoft Cloud breach

One simple way to cut ransomware recovery costs in half

Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost […]

The post One simple way to cut ransomware recovery costs in half appeared first on Security Intelligence.

Continue reading One simple way to cut ransomware recovery costs in half

One simple way to cut ransomware recovery costs in half

Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost […]

The post One simple way to cut ransomware recovery costs in half appeared first on Security Intelligence.

Continue reading One simple way to cut ransomware recovery costs in half

The link between home, family and company security

It’s no surprise that cyber criminals target high-profile individuals or those with access privilege. Malicious actors often use social engineering and whale phishing attacks against these people to breach systems. But households and family members of company executives may also be the target of cyberattacks. In some cases, such as sextortion attempts, criminals demand monetary […]

The post The link between home, family and company security appeared first on Security Intelligence.

Continue reading The link between home, family and company security

How to prevent and prepare for a cyber catastrophe

Ransomware and data leaks are inconvenient and costly. But what about a cyber incident that leads to mass casualties?  The notion of “black swan” events — incidents that are so rare and unusual they cannot be predicted —  is a “fallacy”, according to Sarah Armstrong-Smith, Chief Security Advisor at Microsoft, during her talk at UK […]

The post How to prevent and prepare for a cyber catastrophe appeared first on Security Intelligence.

Continue reading How to prevent and prepare for a cyber catastrophe

Will data backups save you from ransomware? Think again

Backups are an essential part of any solid anti-ransomware strategy. In fact, research shows that the median recovery cost for ransomware victims that used backups is half the cost incurred by those that paid the ransom. But not all data backup approaches are created equal. A separate report found that in 93% of ransomware incidents, […]

The post Will data backups save you from ransomware? Think again appeared first on Security Intelligence.

Continue reading Will data backups save you from ransomware? Think again

Was the digital transformation worth it, security-wise?

Not long ago, the corporate world was enthralled with the promise of digital transformation. But in the midst of the digital revolution, people were paying less attention to security than they probably should have. The business advantages of digital transformation may be obvious. So how do we account for the associated security risks and costs? […]

The post Was the digital transformation worth it, security-wise? appeared first on Security Intelligence.

Continue reading Was the digital transformation worth it, security-wise?

QRadar SIEM reduces incident investigation time by 90%

Rising risk, long incident remediation times and high security costs — these things keep security professionals up at night. But SIEM can make a positive difference in all three, according to a recent report. Security information and event management (SIEM) frameworks help enterprises monitor, manage and mitigate the impact of cyberattacks. With the rising number […]

The post QRadar SIEM reduces incident investigation time by 90% appeared first on Security Intelligence.

Continue reading QRadar SIEM reduces incident investigation time by 90%

Are we doomed to make the same security mistakes with AI?

If you ask Jen Easterly, director of CISA, the current cybersecurity woes are largely the result of misaligned incentives. This occurred as the technology industry prioritized speed to market over security, said Easterly at a recent Hack the Capitol event in McLean, Virginia. “We don’t have a cyber problem, we have a technology and culture […]

The post Are we doomed to make the same security mistakes with AI? appeared first on Security Intelligence.

Continue reading Are we doomed to make the same security mistakes with AI?