AI Adoption Lags as Hype Trumps Benefits

If it seems as though companies have been dragging their feet with adopting artificial intelligence (AI) technologies, they have. Despite its perceived benefits, a new global study on the current and future use of AI technologies conducted by Protivit… Continue reading AI Adoption Lags as Hype Trumps Benefits

Dispelling the ‘Security as Bad Guy’ Myth

It’s not easy being the “Department of No,” those security people who block access to everything—the ones who force employees to change their passwords and use multi-factor authentication. Security itself isn’t the problem; in fact, … Continue reading Dispelling the ‘Security as Bad Guy’ Myth

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together

Preventing Security Breaches Within Company Search Applications

Far too many organizations found their names in headlines during the first month of 2019. Many came after a security researcher discovered a trove of Elasticsearch database misconfigurations that left data exposed without passwords. In one of the more… Continue reading Preventing Security Breaches Within Company Search Applications

Winter’s Cold Won’t Put a Freeze on Phishing

2018 was the year of the phish, and phishing attacks are only growing more sophisticated Despite the bitter temperatures that January brings, fishing enthusiasts will brave the cold and traverse across the ice with saws and augers to drop a line or a … Continue reading Winter’s Cold Won’t Put a Freeze on Phishing

What’s a Pop-Up SOC, and Who Needs One?

High-profile events across the globe are prime targets for hackers, which puts a huge security burden on an event’s host. Even if the host has secured the infrastructure for day-to-day operations, a large-scale attack needs to be locked down immediate… Continue reading What’s a Pop-Up SOC, and Who Needs One?

What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices?

What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?

The post What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices? appeared first on Security Intelligence.

Continue reading What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices?

Can Smart Home Leaks Lead to Major Cyberattacks?

Smart speakers were everywhere this holiday season. According to a recent survey conducted by GetApp Lab, smart speakers were one of this year’s most wanted tech gifts. The new Echo Dot was the most purchased item on Amazon globally over the Tha… Continue reading Can Smart Home Leaks Lead to Major Cyberattacks?

3 Urgent Areas of Action to Address National Cybersecurity Risks

The U.S. is not where it needs to be in terms of managing cybersecurity risks as a national effort, according to the Aspen Cybersecurity Group.

The post 3 Urgent Areas of Action to Address National Cybersecurity Risks appeared first on Security Intelligence.

Continue reading 3 Urgent Areas of Action to Address National Cybersecurity Risks

Is It Time for Enterprises to Bid Farewell to BYOD?

As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe?

The post Is It Time for Enterprises to Bid Farewell to BYOD? appeared first on Security Intelligence.

Continue reading Is It Time for Enterprises to Bid Farewell to BYOD?