72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR).

The post 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline appeared first on Security Intelligence.

Continue reading 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

Risky Mobile Apps No Fun for Entertainment Sector

In case it’s not already on your risk radar, it’s time to add mobile apps to the growing list of threat vectors. Mobile apps are risky across all sectors, but more specifically, those that come from media and entertainment businesses are putting users… Continue reading Risky Mobile Apps No Fun for Entertainment Sector

Who Needs Privacy? Consumers Opt for Convenience in Voice, Home Assistants

Whether it’s Alexa, Amazon Echo, Google Home or some other voice recognition, home assistants are growing in popularity. As voice and digital assistant devices continues to burgeon, though, many consumers remain worried about their privacy, part… Continue reading Who Needs Privacy? Consumers Opt for Convenience in Voice, Home Assistants

Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.

The post Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong appeared first on Security Intelligence.

Continue reading Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

Vulnerable Web Applications Leave All Sectors at Risk

Coming into 2018, security professionals expected to see a continued increase in the use of websites as a means of infecting user workstations, according to a recently released report from Positive Technologies. The prediction has proven true. Website… Continue reading Vulnerable Web Applications Leave All Sectors at Risk

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that’s not even human?

The post Humans vs. Machines: Will Adversarial AI Become the Better Hacker? appeared first on Security Intelligence.

Continue reading Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

A Proposed Solution to the Password Reuse Problem

A group of researchers proposed a new framework that would enable web services to share users’ password hash data in an effort to reduce password reuse.

The post A Proposed Solution to the Password Reuse Problem appeared first on Security Intelligence.

Continue reading A Proposed Solution to the Password Reuse Problem

Why the Double Standard of Reporting Breaches?

Most people like to point out when things in life are not fair, often asking, “Why do I have to do it if they don’t?” Cybersecurity professionals likely ask that question when it comes to reporting breaches. According to a new survey, &#82… Continue reading Why the Double Standard of Reporting Breaches?

Security Mistakes that Could Cripple the Network

What’s the solution for the simple security mistakes caused by human error? Every company worries about protecting itself against the next WannaCry-esque cyberattack, but the truth is that most critical issues in the enterprise network are cause… Continue reading Security Mistakes that Could Cripple the Network

Employee Security Training: If You Train Them, They Will Comply

Ensuring employees have the right security training and understand the risks can help improve online behavior It’s well-known across all sectors that technology alone cannot defend organizations against cyberattacks. Why? Because of end user errors. E… Continue reading Employee Security Training: If You Train Them, They Will Comply