Will the Metaverse Usher in a Universe of Security Challenges?

How much do you know about the metaverse?  Everyone started talking about the metaverse in the summer of 2021. Facebook CEO Mark Zuckerberg kicked it off with his plan to focus his company on building what he imagined would be the future of social, business, leisure and culture: the metaverse. He even changed the name […]

The post Will the Metaverse Usher in a Universe of Security Challenges? appeared first on Security Intelligence.

Continue reading Will the Metaverse Usher in a Universe of Security Challenges?

Reactive Cybersecurity: How to Get it Right

Cyberattacks happen. What you do afterward can affect your cybersecurity posture for years to come. But it can also affect your ongoing success as a business, your good name and your compliance with the laws that govern your industry. You can only realize the full benefits of cybersecurity with the one-two punch of strong proactive […]

The post Reactive Cybersecurity: How to Get it Right appeared first on Security Intelligence.

Continue reading Reactive Cybersecurity: How to Get it Right

What Cybersecurity Professionals Are Wishing for This Holiday Season

After another tough year in the cybersecurity trenches, security professionals deserve a well-earned holiday, along with some powerful gifts to help them cope with the new year’s daunting threat landscape and the security challenges to come.  Here’s our rundown of what cybersecurity professionals are wishing for this holiday season.  1. An Artificial Intelligence Ethical Hacking […]

The post What Cybersecurity Professionals Are Wishing for This Holiday Season appeared first on Security Intelligence.

Continue reading What Cybersecurity Professionals Are Wishing for This Holiday Season

How the Rise in Cyberattacks Is Changing Consumer Behavior

If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling, isn’t new. The growing frequency, cost and impact of cyberattacks are new — and consumers notice. Consumers are more aware of attacks than ever before. […]

The post How the Rise in Cyberattacks Is Changing Consumer Behavior appeared first on Security Intelligence.

Continue reading How the Rise in Cyberattacks Is Changing Consumer Behavior

How to Design IoT Security From the Ground Up

The Internet of Things (IoT) is a powerful boon to business. But it also represents a massive potential expansion of the cybersecurity attack surface. So far, IoT inclusion in many organizations has been poorly organized, haphazard and poorly planned. This needs to change. After all, IT security depends on IoT security.  Why IoT Security Is […]

The post How to Design IoT Security From the Ground Up appeared first on Security Intelligence.

Continue reading How to Design IoT Security From the Ground Up

Top Cybersecurity Threats Around the Globe

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives.  Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch […]

The post Top Cybersecurity Threats Around the Globe appeared first on Security Intelligence.

Continue reading Top Cybersecurity Threats Around the Globe

Breach and Attack Simulation: Hack Yourself to a More Secure Future

Getting breached is the surest way to learn your organization’s cybersecurity vulnerabilities. And that’s why you need to hack yourself before threat actors do. A cyber breach and attack simulation, also called red teaming, is best to understand vulnerabilities in practice, rather than just theory. What can you do before, during and after a simulated […]

The post Breach and Attack Simulation: Hack Yourself to a More Secure Future appeared first on Security Intelligence.

Continue reading Breach and Attack Simulation: Hack Yourself to a More Secure Future

Maritime Cybersecurity: A Rising Tide Lifts all Boats

Ports and ships — the maritime industry — are vital points in the global supply chain for food, medicine, consumer goods, fuel and many other products. Most of the world’s globally traded goods travel by sea. That’s why maritime security is key for supply chain security. Meanwhile, maritime cybersecurity faces threats at multiple places, including […]

The post Maritime Cybersecurity: A Rising Tide Lifts all Boats appeared first on Security Intelligence.

Continue reading Maritime Cybersecurity: A Rising Tide Lifts all Boats

Remote Work Security: Handling Setbacks in the Time of COVID-19

Most security experts, IT workers and leaders understand that the pandemic brought a decline in business and digital safety. A big part of that is the rush to get set up at home and establish remote work security. But why, exactly? It turns out that surprising factors degraded the security of the remote workforce. Let’s start […]

The post Remote Work Security: Handling Setbacks in the Time of COVID-19 appeared first on Security Intelligence.

Continue reading Remote Work Security: Handling Setbacks in the Time of COVID-19

Facing Tech Burnout? Here’s How Employers Can Help

Cybersecurity demands skill and experience. But it also calls for an engaged, motivated and energetic team. And that’s why tech burnout among staff is not only a mental health problem for the employees, it’s also a cybersecurity vulnerability for their employer.  What Is Burnout, Anyway?  The word ‘burnout’ was first used by psychologist Herbert Freudenberger […]

The post Facing Tech Burnout? Here’s How Employers Can Help appeared first on Security Intelligence.

Continue reading Facing Tech Burnout? Here’s How Employers Can Help