How Do You Secure a Smart City?

Cybersecurity investments are rarely discussed during a smart city’s strategic process. As smart cities become more complex, governments may be forced to play a continuous game of catch-up.

The post How Do You Secure a Smart City? appeared first on Security Intelligence.

Continue reading How Do You Secure a Smart City?

How to Optimize Security Awareness Training for Different Groups

The more relevant you can make security awareness training to your audience, the more likely you are to have higher engagement rates. But how can you optimize security training for different groups?

The post How to Optimize Security Awareness Training for Different Groups appeared first on Security Intelligence.

Continue reading How to Optimize Security Awareness Training for Different Groups

Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Continue reading Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

Reading Time: 5 minutes According to a recent study from Palo Alto Networks and YouGov, some of us have more trust in cybersecurity AI than we do humans when it comes to managing security.

The post What Would You Trust to Protect Your Business: Humans or Cybersecurity AI? appeared first on Security Intelligence.

Continue reading What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

Take a Proactive Approach to the Darknet Threat

A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.

The post Take a Proactive Approach to the Darknet Threat appeared first on Security Intelligence.

Continue reading Take a Proactive Approach to the Darknet Threat

How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?

The post How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering appeared first on Security Intelligence.

Continue reading How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Are Companies Doing Enough to Secure PII? I Spoke With Security Expert Frank Abagnale to Find Out

For the enterprise responsible for protecting customers’ PII, should passwords be stored at all — even encrypted?

The post Are Companies Doing Enough to Secure PII? I Spoke With Security Expert Frank Abagnale to Find Out appeared first on Security Intelligence.

Continue reading Are Companies Doing Enough to Secure PII? I Spoke With Security Expert Frank Abagnale to Find Out

The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security

Healthcare security is going to play a huge role if the utopian vision of a purely digital healthcare ecosystem is going to be realized.

The post The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security appeared first on Security Intelligence.

Continue reading The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security

It’s Time for an Automotive Cybersecurity Wake-Up Call

The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.

The post It’s Time for an Automotive Cybersecurity Wake-Up Call appeared first on Security Intelligence.

Continue reading It’s Time for an Automotive Cybersecurity Wake-Up Call

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current