Cybersecurity Awareness Month: It’s Time to Ditch the Fear

  Cybersecurity awareness month is here. Each year, it’s important to explore any new tactics the industry can leverage to raise awareness. The threat landscape is evolving and expanding too quickly for us to keep up. So, we can’t afford to rely on the same awareness gambits year after year.  For as long as the […]

The post Cybersecurity Awareness Month: It’s Time to Ditch the Fear appeared first on Security Intelligence.

Continue reading Cybersecurity Awareness Month: It’s Time to Ditch the Fear

How Estonia Created Trust in Its Digital-Forward Government

Cities are becoming smarter every day, and many state and local governments are pushing towards the digitalization of public services. Some North American cities are working hard to integrate online services and manage cybersecurity risk at the same time. Meanwhile, perhaps the best example of a digital city is in fact a digital country.  The […]

The post How Estonia Created Trust in Its Digital-Forward Government appeared first on Security Intelligence.

Continue reading How Estonia Created Trust in Its Digital-Forward Government

The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The […]

The post The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have appeared first on Security Intelligence.

Continue reading The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

In a world in which bad news dominates, social engineering scams that carry a promise of good news can be incredibly lucrative for cyber criminals.  In one recent example, fraudsters set up a phony job posting using a real recruiter as the contact person for the hiring process. Applicants hoping for a chance at the […]

The post Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work appeared first on Security Intelligence.

Continue reading Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Why a Phishing Attack Is Still Profitable — And How To Stop One

As the business world continues to grapple with an expanding definition of new normal, the phishing attack remains a common tactic for attackers. Why are phishing attacks still happening? How can we prevent them? We spoke to a threat analyst who has the answers. In May 2020, X-Force research uncovered a precision-targeting (or spear phishing) […]

The post Why a Phishing Attack Is Still Profitable — And How To Stop One appeared first on Security Intelligence.

Continue reading Why a Phishing Attack Is Still Profitable — And How To Stop One

Don’t Forget: A Checklist for Offboarding Remote Employees Securely

We all know about the threat of threat actors trying to access our corporate data.  But with the rise of remote work, keeping an eye on employees during offboarding is an important area to watch, as well. In many cases, employees can still access sensitive data well after they leave the job. This is even […]

The post Don’t Forget: A Checklist for Offboarding Remote Employees Securely appeared first on Security Intelligence.

Continue reading Don’t Forget: A Checklist for Offboarding Remote Employees Securely

AI Security: How Human Bias Limits Artificial Intelligence

For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.  How can defenders stay ahead? To gain context about AI that goes beyond prediction, detection […]

The post AI Security: How Human Bias Limits Artificial Intelligence appeared first on Security Intelligence.

Continue reading AI Security: How Human Bias Limits Artificial Intelligence

New Ransomware Threats Are Getting Bolder: How to Rewrite the Script

Greater exposure is both good news and bad news when it comes to new ransomware threats. While ransomware attacks themselves are never good news, it is a positive sign that these attacks are receiving more media attention, such as the attack on an entire hospital chain, an attack on a Las Vegas school district and even […]

The post New Ransomware Threats Are Getting Bolder: How to Rewrite the Script appeared first on Security Intelligence.

Continue reading New Ransomware Threats Are Getting Bolder: How to Rewrite the Script

Cookie Hijacking: More Dangerous Than it Sounds

Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack surface widening with more apps, devices and systems connecting than ever before, threat actors are working overtime to beat MFA. Cookie hijacking in particular is a […]

The post Cookie Hijacking: More Dangerous Than it Sounds appeared first on Security Intelligence.

Continue reading Cookie Hijacking: More Dangerous Than it Sounds

Developers vs. Security: Who is Responsible for Application Security?

Call it the blame game or just a vicious circle. The long-standing tension between developers and IT security experts is not easing anytime soon. Each side blames the other for security risks in application security and other areas, but digital defense overall will suffer unless the two sides come together. We spoke to Vikram Kunchala, […]

The post Developers vs. Security: Who is Responsible for Application Security? appeared first on Security Intelligence.

Continue reading Developers vs. Security: Who is Responsible for Application Security?