New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence […]

The post New DOJ Team Focuses on Ransomware and Cryptocurrency Crime appeared first on Security Intelligence.

Continue reading New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

Top Security Concerns When Accepting Crypto Payment

From Microsoft to AT&T to Home Depot, more companies are accepting cryptocurrency as a way to pay for products and services. This makes perfect sense as crypto coins are a viable revenue source. Perhaps the time is ripe for businesses to learn how to receive, process and convert crypto payments into fiat currency. Still, many […]

The post Top Security Concerns When Accepting Crypto Payment appeared first on Security Intelligence.

Continue reading Top Security Concerns When Accepting Crypto Payment

How to Protect Your Intellectual Property in the Metaverse

Will people ever live in a digital world 24/7? Nobody knows for sure, but the metaverse is certainly expanding rapidly. As the world dives deeper into the digital realm, companies need guidance on how to protect their assets and intellectual property (IP). Consider that the top 10 most expensive NFTs in the world all sold […]

The post How to Protect Your Intellectual Property in the Metaverse appeared first on Security Intelligence.

Continue reading How to Protect Your Intellectual Property in the Metaverse

How to Protect Your Intellectual Property in the Metaverse

Will people ever live in a digital world 24/7? Nobody knows for sure, but the metaverse is certainly expanding rapidly. As the world dives deeper into the digital realm, companies need guidance on how to protect their assets and intellectual property (IP). Consider that the top 10 most expensive NFTs in the world all sold […]

The post How to Protect Your Intellectual Property in the Metaverse appeared first on Security Intelligence.

Continue reading How to Protect Your Intellectual Property in the Metaverse

Which Third-Party Messenger App Is Best for Secure Business?

In October 2021, Facebook (now Meta), and all its platforms (Instagram, WhatsApp and Messenger) shut down across the globe for up to six hours, leaving billions without a messaging service. While Facebook engineers scrambled to fix the problem, users pivoted to other apps to stay connected. In the wake of the outage, Telegram added 70 […]

The post Which Third-Party Messenger App Is Best for Secure Business? appeared first on Security Intelligence.

Continue reading Which Third-Party Messenger App Is Best for Secure Business?

NFT Security Risks: Old Scams and New Tricks

The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores increased nearly 300% in March 2021.   To participate in an NFT marketplace, you must have an active cryptocurrency wallet. This exposes NFT holders to new risks as attackers can […]

The post NFT Security Risks: Old Scams and New Tricks appeared first on Security Intelligence.

Continue reading NFT Security Risks: Old Scams and New Tricks

Low-Code Is Easy, but Is it Secure?

Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry about the risks. The global low-code platform market revenue was valued at nearly $13 billion […]

The post Low-Code Is Easy, but Is it Secure? appeared first on Security Intelligence.

Continue reading Low-Code Is Easy, but Is it Secure?

IAM Secures the New, Perimeter-less Reality

Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform rapidly. Today, many of us work from home. Remote and hybrid work models have become the new normal. But what about security?  In one recent survey, 70% of office workers admitted to using their […]

The post IAM Secures the New, Perimeter-less Reality appeared first on Security Intelligence.

Continue reading IAM Secures the New, Perimeter-less Reality

IoT Security and the Internet of Forgotten Things

In 2017, the number of connected devices surpassed the world’s human population. That’s a lot of things. However, many of them were not built with security in mind. It didn’t take long for attackers to take advantage of Internet of Things (IoT) vulnerabilities.  One case in 2016 saw threat actors take down Dyn, a company […]

The post IoT Security and the Internet of Forgotten Things appeared first on Security Intelligence.

Continue reading IoT Security and the Internet of Forgotten Things

It’s Not Fair, But Cyber Crime Is Cheap

It may not be fair, but cyber crime is cheap. How cheap? You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get a phishing kit for free on underground forums. Although these illicit methods may not be expensive, the […]

The post It’s Not Fair, But Cyber Crime Is Cheap appeared first on Security Intelligence.

Continue reading It’s Not Fair, But Cyber Crime Is Cheap