How I got started: Cloud security engineer

In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep […]

The post How I got started: Cloud security engineer appeared first on Security Intelligence.

Continue reading How I got started: Cloud security engineer

Can a private internet co-exist with the internet we know?

The security industry has always dreamed about an impenetrable internet where threats are neutralized and attackers cannot thrive. Many have tried to conceptualize this theory into reality, but for the time being, it remains a dream. But one company, Dark Cryptonite, has already created this infrastructure. If you’re still dreaming of a world where the […]

The post Can a private internet co-exist with the internet we know? appeared first on Security Intelligence.

Continue reading Can a private internet co-exist with the internet we know?

Paying Ransomware’s Ransom: Why it’s Time to Reconsider

Each year, we continue our everlasting hope that ransomware attacks will disappear. The unfortunate reality is that ransomware is as prominent as ever. Experts predict that ransomware attacks will only become more frequent and sophisticated, posing an even greater threat across all industries. When ransomware strikes, the biggest question a company has to answer is […]

The post Paying Ransomware’s Ransom: Why it’s Time to Reconsider appeared first on Security Intelligence.

Continue reading Paying Ransomware’s Ransom: Why it’s Time to Reconsider

How I Got Started: White Hat Hacker

White hat hackers serve as a crucial line of cyber defense, working to identify and mitigate potential threats before malicious actors can exploit them. These ethical hackers harness their skills to assess the security of networks and systems, ultimately helping organizations bolster their digital defenses. But what drives someone to pursue a career as a […]

The post How I Got Started: White Hat Hacker appeared first on Security Intelligence.

Continue reading How I Got Started: White Hat Hacker

Are Ransomware Attacks Declining, or Has Reporting Worsened?

While examining the state of ransomware in 2023, the statistics show promise — at least on the surface. According to the IBM X-Force Threat Intelligence Index 2023, “Ransomware’s share of incidents declined from 21% in 2021 to 17% in 2022.” Also promising: ransomware groups had a shaky 2022. The Trickbot group, for example, faced significant […]

The post Are Ransomware Attacks Declining, or Has Reporting Worsened? appeared first on Security Intelligence.

Continue reading Are Ransomware Attacks Declining, or Has Reporting Worsened?

Can Large Language Models Boost Your Security Posture?

The threat landscape is expanding, and regulatory requirements are multiplying. For the enterprise, the challenges just to keep up are only mounting. In addition, there’s the cybersecurity skills gap. According to the (ISC)2 2022 Cybersecurity Workforce Study, the global cybersecurity workforce gap has increased by 26.2%, which means 3.4 million more workers are needed to […]

The post Can Large Language Models Boost Your Security Posture? appeared first on Security Intelligence.

Continue reading Can Large Language Models Boost Your Security Posture?

How I Got Started: Offensive Security

In the high-stakes world of cybersecurity, offensive security experts play a pivotal role in identifying and mitigating potential threats. These professionals, sometimes referred to as “ethical hackers”, use their skills to probe networks and systems in search of vulnerabilities, ultimately helping organizations fortify their digital defenses. In this exclusive Q&A, we spoke with a seasoned […]

The post How I Got Started: Offensive Security appeared first on Security Intelligence.

Continue reading How I Got Started: Offensive Security

How I Got Started: SOC Analyst

The role of a Security Operations Center (SOC) analyst is crucial in maintaining an organization’s security posture. A SOC analyst wears many hats but typically acts as a watchdog looking out for attacks in progress while also finding ways to boost defenses and prevent or mitigate future attacks. In this exclusive Q&A, we spoke with […]

The post How I Got Started: SOC Analyst appeared first on Security Intelligence.

Continue reading How I Got Started: SOC Analyst

The Importance of Accessible and Inclusive Cybersecurity

As the digital world continues to dominate our personal and work lives, it’s no surprise that cybersecurity has become critical for individuals and organizations. But society is racing toward “digital by default”, which can be a hardship for individuals unable to access digital services. People depend on these digital services for essential online services, including […]

The post The Importance of Accessible and Inclusive Cybersecurity appeared first on Security Intelligence.

Continue reading The Importance of Accessible and Inclusive Cybersecurity

Breaking Down a Cyberattack, One Kill Chain Step at a Time

In today’s wildly unpredictable threat landscape, the modern enterprise should be familiar with the cyber kill chain concept. A cyber kill chain describes the various stages of a cyberattack pertaining to network security. Lockheed Martin developed the cyber kill chain framework to help organizations identify and prevent cyber intrusions. The steps in a kill chain […]

The post Breaking Down a Cyberattack, One Kill Chain Step at a Time appeared first on Security Intelligence.

Continue reading Breaking Down a Cyberattack, One Kill Chain Step at a Time