A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast, they […]

The post A Game of Chess: Entropy and Patterns in Threat Intelligence appeared first on Security Intelligence.

Continue reading A Game of Chess: Entropy and Patterns in Threat Intelligence

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats

As facial recognition technology advances, bad actors will have more biometric data with which to create deepfake images, videos, sounds and more. Is the security community prepared for this threat?

The post Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats appeared first on Security Intelligence.

Continue reading Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats

It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

The post It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare appeared first on Security Intelligence.

Continue reading It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security

Chief information security officers (CISOs) shouldn’t be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk.

The post Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security appeared first on Security Intelligence.

Continue reading Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security

Lessons From the Cold War: Data Security Through Obscurity

What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.

The post Lessons From the Cold War: Data Security Through Obscurity appeared first on Security Intelligence.

Continue reading Lessons From the Cold War: Data Security Through Obscurity

Anti-I: The Future of AI-Generated Malware

As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.

The post Anti-I: The Future of AI-Generated Malware appeared first on Security Intelligence.

Continue reading Anti-I: The Future of AI-Generated Malware

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

The post Internet-Connected Toys: Cute, Cuddly and Inherently Insecure appeared first on Security Intelligence.

Continue reading Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.

The post Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

Funny Money: Exploring the Connection Between Bitcoin and Ransomware

Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.

The post Funny Money: Exploring the Connection Between Bitcoin and Ransomware appeared first on Security Intelligence.

Continue reading Funny Money: Exploring the Connection Between Bitcoin and Ransomware