Allegory of the ‘Synthetic Data Cave’

Can synthetic data solve the issue of fake news and discern truth from lies in the digital world? What lessons can data engineers and consumers of information in today’s digital world take from Plato’s “Allegory of the Cave“? Actually, qui… Continue reading Allegory of the ‘Synthetic Data Cave’

How to Transform Data Into Actionable Threat Intelligence

Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.

The post How to Transform Data Into Actionable Threat Intelligence appeared first on Security Intelligence.

Continue reading How to Transform Data Into Actionable Threat Intelligence

Making a Big Impact with a Small Security Budget

An excessive security budget isn’t the only way to build strong security Enterprises invest a lot of money into cybersecurity, yet still they get breached. We need look no further than Yahoo! to see the hard, cold truth that if attackers are persisten… Continue reading Making a Big Impact with a Small Security Budget

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps an attacker takes to perform a breach. Malware attacks are among… Continue reading Detecting Bad Actors Early in the Kill Chain

If Video Killed the Radio, Will Malvertising Kill Your Website?

Malvertising isn’t just a nuisance for internet users — it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem.

The post If Video Killed the Radio, Will Malvertising Kill Your Website? appeared first on Security Intelligence.

Continue reading If Video Killed the Radio, Will Malvertising Kill Your Website?

How to Build a Corporate Culture of Cyber Awareness

The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

The post How to Build a Corporate Culture of Cyber Awareness appeared first on Security Intelligence.

Continue reading How to Build a Corporate Culture of Cyber Awareness

Offensive Security: Hacking and Breaking to Secure the Internet

For most people outside of the IT and cybersecurity industries, the words “hacker” and “hacking” have ghastly connotations. Many envision a criminal bereft of any morals, whose only purpose is to pilfer, spy or defame his victi… Continue reading Offensive Security: Hacking and Breaking to Secure the Internet

Is End-to-End IoT Security Financially Feasible — or Even Possible?

Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.

The post Is End-to-End IoT Security Financially Feasible — or Even Possible? appeared first on Security Intelligence.

Continue reading Is End-to-End IoT Security Financially Feasible — or Even Possible?

Confronting Security Issues in Today’s Mobile Workforce

Mobile allows users to work from anywhere at any time, but the extended office demands modern approaches to extended security Whether it’s the local library of the nearest Starbucks, most open-door establishments provide public Wi-Fi access to their p… Continue reading Confronting Security Issues in Today’s Mobile Workforce