Why Humans Are a Growing Target for Cyberattacks — And What to Do About It

Cybersecurity defenses and cyberattack methods are evolving rapidly, but human beings, not so much. This is why nearly all cyberattacks are now based on exploiting human nature.

The post Why Humans Are a Growing Target for Cyberattacks — And What to Do About It appeared first on Security Intelligence.

Continue reading Why Humans Are a Growing Target for Cyberattacks — And What to Do About It

The Art of Patch Management

Reading Time: 4 minutes The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science — it’s an art.

The post The Art of Patch Management appeared first on Security Intelligence.

Continue reading The Art of Patch Management

How to Know if Your Cybersecurity Tools Are Actually Working

Reading Time: 3 minutes It’s time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.

The post How to Know if Your Cybersecurity Tools Are Actually Working appeared first on Security Intelligence.

Continue reading How to Know if Your Cybersecurity Tools Are Actually Working

How Video Became a Dangerous Delivery Vehicle for Malware Attacks

Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here’s how your enterprise security team can fight back.

The post How Video Became a Dangerous Delivery Vehicle for Malware Attacks appeared first on Security Intelligence.

Continue reading How Video Became a Dangerous Delivery Vehicle for Malware Attacks

Facing the Promise and Peril of Facial Recognition for Authentication

Reading Time: 6 minutes Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how? Increasingly, one answer is facial recognition.

The post Facing the Promise and Peril of Facial Recognition for Authentication appeared first on Security Intelligence.

Continue reading Facing the Promise and Peril of Facial Recognition for Authentication

Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

The workforce is becoming more “invisible.” But far too many organizations still aren’t taking this into consideration during security planning.

The post Your ‘Invisible Workforce’ Needs More Visibility in Security Planning appeared first on Security Intelligence.

Continue reading Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

Why You Should Constantly Enrich Security Culture Throughout Your Organization

Here’s what you need to know about organizational security culture — and how to plan for and inspire a better one.

The post Why You Should Constantly Enrich Security Culture Throughout Your Organization appeared first on Security Intelligence.

Continue reading Why You Should Constantly Enrich Security Culture Throughout Your Organization