The Past, Present and Future of Endpoint Management Solutions

Endpoint management is a simple concept that’s become more complex over time. Initially, it was about provisioning and managing the computers and devices that people use in your organization in the bring your own device (BYOD) and mobile computing era. Then the Internet of Things (IoT) made things far more complex. And now perimeter security […]

The post The Past, Present and Future of Endpoint Management Solutions appeared first on Security Intelligence.

Continue reading The Past, Present and Future of Endpoint Management Solutions

NIST Supply Chain Security Guidelines: 10 Key Takeaways

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) recently published updated guidance for reducing cybersecurity risks in supply chains. Titled “Software Supply Chain Security Guidance,” the update is NIST’s response to directives issued by an executive order by President Joe Biden, designed to improve cybersecurity in the United States.  This NIST […]

The post NIST Supply Chain Security Guidelines: 10 Key Takeaways appeared first on Security Intelligence.

Continue reading NIST Supply Chain Security Guidelines: 10 Key Takeaways

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber […]

The post U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack appeared first on Security Intelligence.

Continue reading U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

Hospital Ransomware Attack: Here’s What a Cybersecurity Success Story Sounds Like 

Major ransomware attacks are scary, but against hospitals, they are even worse. One notable attack in August 2021 forced Ohio’s Memorial Health System emergency room to shut down (patients were diverted to other hospitals). In all hospital attacks, the health, safety, privacy and lives of patients face risk. But this incident also shows that whether targets […]

The post Hospital Ransomware Attack: Here’s What a Cybersecurity Success Story Sounds Like  appeared first on Security Intelligence.

Continue reading Hospital Ransomware Attack: Here’s What a Cybersecurity Success Story Sounds Like 

What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’

After decades of playing defense, the United States government went on the offense in the past few years against global state-sponsored cyber attackers. U.S. Cyber Command conducted “hunt forward” operations recently in 16 countries, including in Ukraine, as part of a policy set in 2018.  This policy involves partnering with foreign countries on finding cyber […]

The post What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’ appeared first on Security Intelligence.

Continue reading What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’

One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem

The Colonial Pipeline cyberattack is still causing ripples. Some of these federal mandates may mark major changes for operational technology (OT) cybersecurity. The privately held Colonial Pipeline company, which provides nearly half of the fuel used by the East Coast — gasoline, heating oil, jet fuel and fuel for the military totaling around 100 million […]

The post One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem appeared first on Security Intelligence.

Continue reading One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem

Malicious Reconnaissance: What It Is and How To Stop It

You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.  Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to […]

The post Malicious Reconnaissance: What It Is and How To Stop It appeared first on Security Intelligence.

Continue reading Malicious Reconnaissance: What It Is and How To Stop It

Remote Work Makes it More Important Than Ever to Trust Zero Trust

The remote work era makes the zero trust model critical for most businesses. The time has come to use it. But first, let’s understand what it really is and why the hybrid and remote work trend makes it all but mandatory.  What Is Zero Trust? Zero trust is not a product or a service, but […]

The post Remote Work Makes it More Important Than Ever to Trust Zero Trust appeared first on Security Intelligence.

Continue reading Remote Work Makes it More Important Than Ever to Trust Zero Trust

Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today

“The End of the World!?!” That’s what the cover of TIME Magazine said for its January 18, 1999 issue.  Over two decades ago, the industrialized world was gripped by panic over the so-called Y2K bug. Also called the Millennium Bug, the year 2000 problem, Y2K problem, the Y2K glitch and other labels, some feared the […]

The post Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today appeared first on Security Intelligence.

Continue reading Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today

What to Look for in a Cybersecurity Resume

Staffing for cybersecurity has always presented a challenge. But with the old skills shortage combined with the new “Great Resignation,” hiring the right candidates has never been more important.  The first step in looking at any prospective hire is to review resumes. People often don’t appreciate this process. It’s easy, for example, to overlook the best […]

The post What to Look for in a Cybersecurity Resume appeared first on Security Intelligence.

Continue reading What to Look for in a Cybersecurity Resume