Now Social Engineering Attackers Have AI. Do You? 

Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code.  The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else.  How does this powerful new category of tools affect the ability […]

The post Now Social Engineering Attackers Have AI. Do You?  appeared first on Security Intelligence.

Continue reading Now Social Engineering Attackers Have AI. Do You? 

Do You Really Need a CISO?

Cybersecurity has never been more challenging or vital. Every organization needs strong leadership on cybersecurity policy, procurement and execution — such as a CISO, or chief information security officer.  A CISO is a senior executive in charge of an organization’s information, cyber and technology security. CISOs need a complete understanding of cybersecurity as well as […]

The post Do You Really Need a CISO? appeared first on Security Intelligence.

Continue reading Do You Really Need a CISO?

Why Robot Vacuums Have Cameras (and What to Know About Them)

Robot vacuum cleaner products are by far the largest category of consumer robots. They roll around on floors, hoovering up dust and dirt so we don’t have to, all while avoiding obstacles.  The industry leader, iRobot, has been cleaning up the robot vacuum market for two decades. Over this time, the company has steadily gained […]

The post Why Robot Vacuums Have Cameras (and What to Know About Them) appeared first on Security Intelligence.

Continue reading Why Robot Vacuums Have Cameras (and What to Know About Them)

How Falling Crypto Prices Impacted Cyber Crime

Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto? Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, […]

The post How Falling Crypto Prices Impacted Cyber Crime appeared first on Security Intelligence.

Continue reading How Falling Crypto Prices Impacted Cyber Crime

How the Silk Road Affair Changed Law Enforcement

The Silk Road was the first modern dark web marketplace, an online place for anonymously buying and selling illegal products and services using Bitcoin.  Ross Ulbricht created The Silk Road in 2011 and operated it until 2013 when the FBI shut it down. Its creator was eventually arrested and sentenced to life in prison. But […]

The post How the Silk Road Affair Changed Law Enforcement appeared first on Security Intelligence.

Continue reading How the Silk Road Affair Changed Law Enforcement

Why Zero Trust Works When Everything Else Doesn’t

The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived.  Zero trust — also called zero trust architecture (ZTA), zero trust network architecture (ZTNA) and perimeter-less security — takes a “default deny” security posture. All people and devices must prove explicit permission to use each network resource […]

The post Why Zero Trust Works When Everything Else Doesn’t appeared first on Security Intelligence.

Continue reading Why Zero Trust Works When Everything Else Doesn’t

Synthetic Media Creates New Social Engineering Threats

Social engineering attacks have challenged cybersecurity for years. No matter how strong your digital security, authorized human users can always be manipulated into opening the door for a clever cyber attacker.  Social engineering typically involves tricking an authorized user into taking an action that enables cyber attackers to bypass physical or digital security.  One common […]

The post Synthetic Media Creates New Social Engineering Threats appeared first on Security Intelligence.

Continue reading Synthetic Media Creates New Social Engineering Threats

What to Know About the Pentagon’s New Push for Zero Trust

The Pentagon is taking cybersecurity to the next level — and they’re helping organizations of all kinds do the same. Here’s how the U.S. Department of Defense is implementing zero trust and why this matters to all businesses and organizations.  But first, let’s review this zero trust business.  What is Zero Trust?  Zero trust is […]

The post What to Know About the Pentagon’s New Push for Zero Trust appeared first on Security Intelligence.

Continue reading What to Know About the Pentagon’s New Push for Zero Trust

How Can the White House’s New IoT Labels Improve Security?

The White House’s National Security Council (NSC) is working on an ambitious project to improve consumer Internet of Things (IoT) security through industry-standard labeling. If successful, the labeling system will replace existing frameworks across the globe. Modeled after the EPA’s Energy Star labeling program, the IoT labeling initiative should have two effects: to educate and […]

The post How Can the White House’s New IoT Labels Improve Security? appeared first on Security Intelligence.

Continue reading How Can the White House’s New IoT Labels Improve Security?

Twitter is the New Poster Child for Failing at Compliance

All companies have to comply with privacy and security laws. They must also comply with any settlements or edicts imposed by regulatory agencies of the U.S. government.  But Twitter now finds itself in a precarious position and appears to be failing to take its compliance obligations seriously. The case is a “teachable moment” for all […]

The post Twitter is the New Poster Child for Failing at Compliance appeared first on Security Intelligence.

Continue reading Twitter is the New Poster Child for Failing at Compliance