Unified endpoint management for purpose-based devices

As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized […]

The post Unified endpoint management for purpose-based devices appeared first on Security Intelligence.

Continue reading Unified endpoint management for purpose-based devices

Understanding Saudi Arabia’s personal data protection law

You may be familiar with data protection laws like HIPAA, GDPR and CCPA. But did you know that other foreign countries are also introducing comprehensive regulations? To address escalating data protection challenges, the Personal Data Protection Law (PDPL) was implemented in Saudi Arabia in September 2021. The law was later modified in March 2023, signifying […]

The post Understanding Saudi Arabia’s personal data protection law appeared first on Security Intelligence.

Continue reading Understanding Saudi Arabia’s personal data protection law

How I got started: Attack surface management

As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any […]

The post How I got started: Attack surface management appeared first on Security Intelligence.

Continue reading How I got started: Attack surface management

How I got started: SIEM engineer

As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents […]

The post How I got started: SIEM engineer appeared first on Security Intelligence.

Continue reading How I got started: SIEM engineer

Cost of a data breach 2023: Geographical breakdowns

Data breaches can occur anywhere in the world, but they are historically more common in specific countries. Typically, countries with high internet usage and digital services are more prone to data breaches. To that end, IBM’s Cost of a Data Breach Report 2023 looked at 553 organizations of various sizes across 16 countries and geographic […]

The post Cost of a data breach 2023: Geographical breakdowns appeared first on Security Intelligence.

Continue reading Cost of a data breach 2023: Geographical breakdowns

How I got started: Cloud security engineer

In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep […]

The post How I got started: Cloud security engineer appeared first on Security Intelligence.

Continue reading How I got started: Cloud security engineer

Can a private internet co-exist with the internet we know?

The security industry has always dreamed about an impenetrable internet where threats are neutralized and attackers cannot thrive. Many have tried to conceptualize this theory into reality, but for the time being, it remains a dream. But one company, Dark Cryptonite, has already created this infrastructure. If you’re still dreaming of a world where the […]

The post Can a private internet co-exist with the internet we know? appeared first on Security Intelligence.

Continue reading Can a private internet co-exist with the internet we know?

Paying Ransomware’s Ransom: Why it’s Time to Reconsider

Each year, we continue our everlasting hope that ransomware attacks will disappear. The unfortunate reality is that ransomware is as prominent as ever. Experts predict that ransomware attacks will only become more frequent and sophisticated, posing an even greater threat across all industries. When ransomware strikes, the biggest question a company has to answer is […]

The post Paying Ransomware’s Ransom: Why it’s Time to Reconsider appeared first on Security Intelligence.

Continue reading Paying Ransomware’s Ransom: Why it’s Time to Reconsider

How I Got Started: White Hat Hacker

White hat hackers serve as a crucial line of cyber defense, working to identify and mitigate potential threats before malicious actors can exploit them. These ethical hackers harness their skills to assess the security of networks and systems, ultimately helping organizations bolster their digital defenses. But what drives someone to pursue a career as a […]

The post How I Got Started: White Hat Hacker appeared first on Security Intelligence.

Continue reading How I Got Started: White Hat Hacker

Are Ransomware Attacks Declining, or Has Reporting Worsened?

While examining the state of ransomware in 2023, the statistics show promise — at least on the surface. According to the IBM X-Force Threat Intelligence Index 2023, “Ransomware’s share of incidents declined from 21% in 2021 to 17% in 2022.” Also promising: ransomware groups had a shaky 2022. The Trickbot group, for example, faced significant […]

The post Are Ransomware Attacks Declining, or Has Reporting Worsened? appeared first on Security Intelligence.

Continue reading Are Ransomware Attacks Declining, or Has Reporting Worsened?