How Can the White House’s New IoT Labels Improve Security?

The White House’s National Security Council (NSC) is working on an ambitious project to improve consumer Internet of Things (IoT) security through industry-standard labeling. If successful, the labeling system will replace existing frameworks across the globe. Modeled after the EPA’s Energy Star labeling program, the IoT labeling initiative should have two effects: to educate and […]

The post How Can the White House’s New IoT Labels Improve Security? appeared first on Security Intelligence.

Continue reading How Can the White House’s New IoT Labels Improve Security?

Twitter is the New Poster Child for Failing at Compliance

All companies have to comply with privacy and security laws. They must also comply with any settlements or edicts imposed by regulatory agencies of the U.S. government.  But Twitter now finds itself in a precarious position and appears to be failing to take its compliance obligations seriously. The case is a “teachable moment” for all […]

The post Twitter is the New Poster Child for Failing at Compliance appeared first on Security Intelligence.

Continue reading Twitter is the New Poster Child for Failing at Compliance

The Cybersecurity Takeaway from Twitter’s Verification Chaos

Twitter has been verifiably bonkers since electric car and rocket mogul Elon Musk took over and reworked the social network’s long-standing verification system. This provides a valuable lesson about the link between verification or authentication and between security and usability.  It all started in early October when Musk closed the Twitter deal and claimed that […]

The post The Cybersecurity Takeaway from Twitter’s Verification Chaos appeared first on Security Intelligence.

Continue reading The Cybersecurity Takeaway from Twitter’s Verification Chaos

How Posture Management Prevents Catastrophic Cloud Breaches

We’ve all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public eye. Perhaps worst of all, a large number of the offending vulnerabilities might have been avoided entirely through proper cloud configuration. Many big cloud security catastrophes often result from what appear to be […]

The post How Posture Management Prevents Catastrophic Cloud Breaches appeared first on Security Intelligence.

Continue reading How Posture Management Prevents Catastrophic Cloud Breaches

Inside the Second White House Ransomware Summit

Ransomware is a growing, international threat. It’s also an insidious one.  The state of the art in ransomware is simple but effective. Well-organized criminal gangs hiding in safe-haven countries breach an organization, find, steal and encrypt important files. Then they present victims with the double incentive that, should they refuse to pay, their encrypted files […]

The post Inside the Second White House Ransomware Summit appeared first on Security Intelligence.

Continue reading Inside the Second White House Ransomware Summit

How the DNSChanger Shutdown Changed Cybersecurity

On the morning of July 9, 2012, the world braced for an “internet doomsday”: a full-scale crash of the global internet.  Except it didn’t happen. And that non-event represented the culmination of a long and successful coordinated action taken between a huge number of organizations, spearheaded by the FBI.  It was one of the most […]

The post How the DNSChanger Shutdown Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How the DNSChanger Shutdown Changed Cybersecurity

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe.  […]

The post Why Are Cloud Misconfigurations Still a Major Issue? appeared first on Security Intelligence.

Continue reading Why Are Cloud Misconfigurations Still a Major Issue?

What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running.  Several organizations, including the Office of Management […]

The post What CISOs Want to See From NIST’s Impending Zero Trust Guidelines appeared first on Security Intelligence.

Continue reading What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

CISA Certification: What You Need to Know

The globally-recognized Certified Information Systems Auditor (CISA) certification shows knowledge of IT and auditing, security, governance, control and assurance to assess potential threats. As you can imagine, it’s very much in demand. It can also be confusing.  Is CISA Certification Related to the Cybersecurity and Infrastructure Security Agency? CISA, the certification, is related to CISA, […]

The post CISA Certification: What You Need to Know appeared first on Security Intelligence.

Continue reading CISA Certification: What You Need to Know

How Cybersecurity Policy Has Changed Since the SolarWinds Attack

Major cyberattacks since 2019 jolted the U.S. government and software industry into action. The succeeding years have seen executive orders, new funding, two summits and a newfound resolve. Because of those attacks, the federal government aims to fix the open-source software security threat altogether. But what has really come of these efforts in the last […]

The post How Cybersecurity Policy Has Changed Since the SolarWinds Attack appeared first on Security Intelligence.

Continue reading How Cybersecurity Policy Has Changed Since the SolarWinds Attack