What Is Proactive Cybersecurity?

Most organizations take what you might call an active approach to cybersecurity, They’re prepared to do certain things once an attack happens. Or, they take a reactive approach, taking action after an attack is completed. A proactive cybersecurity strategy is about acting before any attack occurs; it’s a good cybersecurity posture of readiness.  Take a […]

The post What Is Proactive Cybersecurity? appeared first on Security Intelligence.

Continue reading What Is Proactive Cybersecurity?

The Case for Cybersecurity Education for Engineers

Engineering and cybersecurity are two distinct disciplines, each demanding its own rigorous education and training. But should there be crossover? Should engineers or engineering students invest in cybersecurity education as well? What are the opportunities for engineers to gain expertise in protecting against threat actors in the software realm?  As the world becomes more complex […]

The post The Case for Cybersecurity Education for Engineers appeared first on Security Intelligence.

Continue reading The Case for Cybersecurity Education for Engineers

The Real Cost of Ransomware

Ransomware is an expensive cybercrime and getting more so all the time. Payouts have risen massively in the past few years. But while ransomware payment amounts make headlines, the real costs go far beyond what’s paid to the attackers.  How Ransomware Works Now Ransomware has always been a problem. But in recent years, attackers have […]

The post The Real Cost of Ransomware appeared first on Security Intelligence.

Continue reading The Real Cost of Ransomware

How to Build a Winning Cybersecurity Resume

Career advancement is an art form with many facets. One vital tool is your cybersecurity resume, the quality of which can mean the difference between getting an interview for your dream job and not being considered at all.  Following the standard advice on building a resume will give you a standard resume that won’t set […]

The post How to Build a Winning Cybersecurity Resume appeared first on Security Intelligence.

Continue reading How to Build a Winning Cybersecurity Resume

12 Benefits of Hiring a Certified Ethical Hacker

You’ve probably heard the phrase “you don’t know what you don’t know”. It’s a stage of learning most people find themselves in at one time or another. When it comes to cybersecurity, hackers succeed by finding the security gaps and vulnerabilities you missed. That’s true of malicious attackers. But it’s also true of their equivalent […]

The post 12 Benefits of Hiring a Certified Ethical Hacker appeared first on Security Intelligence.

Continue reading 12 Benefits of Hiring a Certified Ethical Hacker

Zero Trust: Follow a Model, Not a Tool

The zero trust model is going mainstream, and for good reason. The rise in advanced attacks, plus IT trends that include the move to hybrid cloud and remote work, demand more exacting and granular defenses.  Zero trust ensures verification and authorization for every device, every application and every user gaining access to every resource. This […]

The post Zero Trust: Follow a Model, Not a Tool appeared first on Security Intelligence.

Continue reading Zero Trust: Follow a Model, Not a Tool

Cryptominers Snuck Logic Bomb Into Python Packages

Malware can show up where you least expect it. Researchers discovered a logic bomb attack in the Python Package Index (PyPI) repository, which is code repository for Python developers and part of the software supply chain. Attackers aimed to get honest software developers to include the bombs in their applications by accident.  The researchers found […]

The post Cryptominers Snuck Logic Bomb Into Python Packages appeared first on Security Intelligence.

Continue reading Cryptominers Snuck Logic Bomb Into Python Packages

Behavior Transparency: Where Application Security Meets Cyber Awareness

How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all, attackers often hijack honest software, networks and systems for dishonest ends. To stop them with security tools, the first step must be to have great […]

The post Behavior Transparency: Where Application Security Meets Cyber Awareness appeared first on Security Intelligence.

Continue reading Behavior Transparency: Where Application Security Meets Cyber Awareness

How Ransomware Trends Are Changing Cyber Insurance

The world of cyber insurance is in a state of flux. The reason: ransomware creates huge financial impacts. And how it will change insurance in the future is unclear. The insurance industry is struggling to develop cyber liability insurance offerings. Meanwhile, history is proving to be a poor guide to what comes next.  Welcome to […]

The post How Ransomware Trends Are Changing Cyber Insurance appeared first on Security Intelligence.

Continue reading How Ransomware Trends Are Changing Cyber Insurance

Spend Wisely (Not Just More) to Become Cyber Resilient

Spending on cybersecurity is hitting record highs. And that makes sense. Because of big changes in how work gets done (plus the rising cost of breaches and attacks, like ransomware), companies are spending more than ever. But simply throwing money at the problem in order to try to become more cyber resilient is not a […]

The post Spend Wisely (Not Just More) to Become Cyber Resilient appeared first on Security Intelligence.

Continue reading Spend Wisely (Not Just More) to Become Cyber Resilient