ICS CERT predictions for 2024: What you need to know

As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure. Kaspersky just released their ICS CERT Predictions for this year, outlining the key […]

The post ICS CERT predictions for 2024: What you need to know appeared first on Security Intelligence.

Continue reading ICS CERT predictions for 2024: What you need to know

Third-party breaches hit 90% of top global energy companies

A new report from SecurityScorecard reveals a startling trend among the world’s top energy companies, with 90% suffering from data breaches through third parties over the last year. This statistic is particularly concerning given the crucial function these companies serve in everyday life. Their increased dependence on digital systems facilitates the increase in attacks on […]

The post Third-party breaches hit 90% of top global energy companies appeared first on Security Intelligence.

Continue reading Third-party breaches hit 90% of top global energy companies

Pentesting vs. Pentesting as a Service: Which is better?

In today’s quickly evolving cybersecurity landscape, organizations constantly seek the most effective ways to secure their digital assets. Penetration testing (pentesting) has emerged as a leading solution for identifying potential system vulnerabilities while closing security gaps that can lead to an attack. At the same time, a newer entrant into the security arena is Pentesting […]

The post Pentesting vs. Pentesting as a Service: Which is better? appeared first on Security Intelligence.

Continue reading Pentesting vs. Pentesting as a Service: Which is better?

Data security tools make data loss prevention more efficient

As businesses navigate the complexities of modern-day cybersecurity initiatives, data loss prevention (DLP) software is the frontline defense against potential data breaches and exfiltration. DLP solutions allow organizations to detect, react to and prevent data leakage or misuse of sensitive information that can lead to catastrophic consequences. However, while DLP solutions play a critical role […]

The post Data security tools make data loss prevention more efficient appeared first on Security Intelligence.

Continue reading Data security tools make data loss prevention more efficient

The importance of Infrastructure as Code (IaC) when Securing cloud environments

According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they […]

The post The importance of Infrastructure as Code (IaC) when Securing cloud environments appeared first on Security Intelligence.

Continue reading The importance of Infrastructure as Code (IaC) when Securing cloud environments

The Growing Risks of Shadow IT and SaaS Sprawl

In today’s fast-paced digital landscape, there is no shortage of apps and Software-as-a-Service (SaaS) solutions tailored to meet the diverse needs of businesses across different industries. This incredible array of options has revolutionized how we work, providing cost-effective and user-friendly tools that streamline tasks and boost productivity. However, this ever-expanding application ecosystem comes with its […]

The post The Growing Risks of Shadow IT and SaaS Sprawl appeared first on Security Intelligence.

Continue reading The Growing Risks of Shadow IT and SaaS Sprawl

The top 10 API security risks OWASP list for 2023

As more organizations rely on the automation and scale that web applications and connected services provide, application programming interface (API) security has become imperative. In just the last year alone, unique attackers targeting customer APIs grew by 400%, proving that organizations must take a proactive approach to secure these increasingly valuable services. But considering the […]

The post The top 10 API security risks OWASP list for 2023 appeared first on Security Intelligence.

Continue reading The top 10 API security risks OWASP list for 2023

SOCs Spend 32% of the Day On Incidents That Pose No Threat

When it comes to the first line of defense for any company, its Security Operations Center (SOC) is an essential component. A SOC is a dedicated team of professionals who monitor networks and systems for potential threats, provide analysis of detected issues and take the necessary actions to remediate any risks they uncover. Unfortunately, SOC […]

The post SOCs Spend 32% of the Day On Incidents That Pose No Threat appeared first on Security Intelligence.

Continue reading SOCs Spend 32% of the Day On Incidents That Pose No Threat

Understanding the Backdoor Debate in Cybersecurity

Unexpected end tag : p

The debate over whether backdoor encryption should be implemented to aid law enforcement has been contentious for years. On one side of the fence, the proponents of backdoors argue that they could provide valuable intelligence and help law enforcement investigate criminals or prevent terrorist attacks. On the other side, opponents contend they would weaken overall […]

The post Understanding the Backdoor Debate in Cybersecurity appeared first on Security Intelligence.

Continue reading Understanding the Backdoor Debate in Cybersecurity

What’s Going On With LastPass, and is it Safe to Use?

When it comes to password managers, LastPass has been one of the most prominent players in the market. Since 2008, the company has focused on providing secure and convenient solutions to consumers and businesses. Or so it seemed. LastPass has been in the news recently for all the wrong reasons, with multiple reports of data […]

The post What’s Going On With LastPass, and is it Safe to Use? appeared first on Security Intelligence.

Continue reading What’s Going On With LastPass, and is it Safe to Use?