Does Your Bug Bounty Program Need an Overhaul?

They’ve become mainstream, but bug bounty programs are vast, varied and complicated When bugs proliferate, there’s potential for an infestation problem that needs to be fumigated. Over the past few years, bug bounty programs have become a popular solu… Continue reading Does Your Bug Bounty Program Need an Overhaul?

What’s Under Your Armor? Gaps in Corporate Security Exposed in Breaches

Key takeaways from the wellspring of newly disclosed breaches In the past week, at least three corporate security breaches have made headlines. Given its massiveness the Under Armour’s MyFitnessPal app breach is most notable, as it left approximately … Continue reading What’s Under Your Armor? Gaps in Corporate Security Exposed in Breaches

What Is the Dark Web and Why Would Businesses Use It?

What is the Dark Web, besides an underground haven for cybercriminals to exchange ideas and illicit data anonymously? It can also be a valuable tool for security teams looking to share threat data.

The post What Is the Dark Web and Why Would Businesses Use It? appeared first on Security Intelligence.

Continue reading What Is the Dark Web and Why Would Businesses Use It?

Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

Recent research has shown that companies are sacrificing mobile security for expediency and business performance.

The post Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security appeared first on Security Intelligence.

Continue reading Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

Benefits of a Multicultural Cybersecurity Workforce

As was the case for the American workforce during World War II, the enormous dearth of talent in the cybersecurity industry presents unprecedented opportunities for women and minorities to fill the jobs gap. According to a new (ICS)2 study, “Inn… Continue reading Benefits of a Multicultural Cybersecurity Workforce

A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

SOC analysts face blizzardlike conditions during tax season as false positives pile up and legitimate tax fraud alerts are liable to fly under the radar.

The post A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives appeared first on Security Intelligence.

Continue reading A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

Lessons for Boards from Yahoo’s $80 Million Data Breach Settlement

What does it mean for board liability in future data breach litigation? At the time it was disclosed, the Yahoo! email breach was considered massive. The personal information of 1.5 billion users was compromised. In response, lead plaintiff Edward McM… Continue reading Lessons for Boards from Yahoo’s $80 Million Data Breach Settlement

Enterprise Security Lessons From the Crypto-Mining Craze

Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.

The post Enterprise Security Lessons From the Crypto-Mining Craze appeared first on Security Intelligence.

Continue reading Enterprise Security Lessons From the Crypto-Mining Craze

Combating W-2 Fraud, An Avalanche of False Positives and Wasted Time

Nobody likes tax season. Except perhaps the cybercriminals who are successfully scamming users into sharing their W-2 information. Year over year, the number of IRS-related phishing scams targeting individuals and companies continues to grow, putting … Continue reading Combating W-2 Fraud, An Avalanche of False Positives and Wasted Time

SMBs continue to be a target of cybercriminals

Because they don’t see themselves as targets, small-to-midsize businesses (SMB) have for a long time believed that their security programs are good enough. They have a firewall, antivirus, maybe they even use two-factor authentication.

The mistake is believing that this is enough because they have nothing of value to an attacker. While they may have a smaller attack surface, they are no less vulnerable than a major enterprise.

Not only are small businesses growing as the favored targets for ransomware attacks, they are also the most impacted, with 60 percent shutting down within six months of a breach, according to the US National Cyber Security Alliance.

To read this article in full or to leave a comment, please click here

Continue reading SMBs continue to be a target of cybercriminals

Posted in Uncategorized