5 IoT Threats To Look Out for in 2021

As we bring 2020 to a close, it’s time to look at 2021 and a new chapter in the book of cybersecurity. While there are no doubt a multitude of possible attacks, here are six types of attacks that are becoming more popular and more common among attackers using Internet of things (IoT) threats. 1. […]

The post 5 IoT Threats To Look Out for in 2021 appeared first on Security Intelligence.

Continue reading 5 IoT Threats To Look Out for in 2021

7 Cybersecurity Tools On Our Holiday Wish List

The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their heads. Instead, they dream of cybersecurity tools and other resources to help them cope with a wild threat landscape.  Here’s our ultimate holiday wish list.  […]

The post 7 Cybersecurity Tools On Our Holiday Wish List appeared first on Security Intelligence.

Continue reading 7 Cybersecurity Tools On Our Holiday Wish List

Security Culture: Putting Digital Literacy First in Your Company

Building a security-first culture is as important for cybersecurity as investing in the right tech or creating and enforcing the right policies.  Defense systems cannot provide 100% of the security organizations need as long as individual employees are making decisions about what to click on, who to trust and, at the leadership levels, where and how much […]

The post Security Culture: Putting Digital Literacy First in Your Company appeared first on Security Intelligence.

Continue reading Security Culture: Putting Digital Literacy First in Your Company

How to Ensure Secure and Complete Data Destruction

Data security means keeping data out of the wrong hands. This is especially important when storage media is no longer usable and needs to be decommissioned. The data must be truly destroyed, for both security and compliance.  The trouble is ‘deleting’ data doesn’t really delete data. It’s still possible to extract data from a device that […]

The post How to Ensure Secure and Complete Data Destruction appeared first on Security Intelligence.

Continue reading How to Ensure Secure and Complete Data Destruction

How and Why to Take a Holistic Approach to Threat Modeling

By taking a broader, more expansive view of threat modeling, organizations can consider the whole picture of their security strategy and improve efficiency. Threat modeling is a systematic approach to finding, prioritizing and fixing security threats, but it can be much more. It invites an exercise in systematic collaborative thinking, and as such its benefits […]

The post How and Why to Take a Holistic Approach to Threat Modeling appeared first on Security Intelligence.

Continue reading How and Why to Take a Holistic Approach to Threat Modeling

Posted in Uncategorized

How to Build Usability Into Your Security Program

Having solid security measures in place is a necessary condition for achieving your organization’s overarching goals, but user productivity requires both security and usability.

The post How to Build Usability Into Your Security Program appeared first on Security Intelligence.

Continue reading How to Build Usability Into Your Security Program