The UK energy sector faces an expanding OT threat landscape

Critical infrastructure is under attack in almost every country, but especially in the United Kingdom. The UK was the most attacked country in Europe, which is already the region most impacted by cyber incidents. The energy industry is taking the brunt of those cyberattacks, according to IBM’s X-Force Threat Intelligence Index 2024. The energy sector […]

The post The UK energy sector faces an expanding OT threat landscape appeared first on Security Intelligence.

Continue reading The UK energy sector faces an expanding OT threat landscape

How I got started: Cyber AI/ML engineer

As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interest, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team […]

The post How I got started: Cyber AI/ML engineer appeared first on Security Intelligence.

Continue reading How I got started: Cyber AI/ML engineer

AI trends: A closer look at machine learning’s role

The hottest technology right now is AI — more specifically, generative AI. The trend is so popular that every conference and webinar speaker feels obligated to mention some form of AI, no matter their field. The innovations and risks that AI offers are both exciting and frightening. However, the heavy focus on this technology overshadows […]

The post AI trends: A closer look at machine learning’s role appeared first on Security Intelligence.

Continue reading AI trends: A closer look at machine learning’s role

What the cybersecurity workforce can expect in 2024

For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. However, the same study reported that there is still a serious shortfall. To best address […]

The post What the cybersecurity workforce can expect in 2024 appeared first on Security Intelligence.

Continue reading What the cybersecurity workforce can expect in 2024

NIST’s security transformation: How to keep up

One thing that came out of the pandemic years was a stronger push toward an organization-wide digital transformation. Working remotely forced companies to integrate digital technologies, ranging from cloud computing services to AI/ML, across business operations to allow workers to keep up high production and efficiency standards. Now that businesses and consumers have adjusted to […]

The post NIST’s security transformation: How to keep up appeared first on Security Intelligence.

Continue reading NIST’s security transformation: How to keep up

Defense in depth: Layering your security coverage

The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides […]

The post Defense in depth: Layering your security coverage appeared first on Security Intelligence.

Continue reading Defense in depth: Layering your security coverage

What is data security posture management?

Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across […]

The post What is data security posture management? appeared first on Security Intelligence.

Continue reading What is data security posture management?

Could a threat actor socially engineer ChatGPT?

As the one-year anniversary of ChatGPT approaches, cybersecurity analysts are still exploring their options. One primary goal is to understand how generative AI can help solve security problems while also looking out for ways threat actors can use the technology. There is some thought that AI, specifically large language models (LLMs), will be the equalizer […]

The post Could a threat actor socially engineer ChatGPT? appeared first on Security Intelligence.

Continue reading Could a threat actor socially engineer ChatGPT?

Cost of a data breach: The evolving role of law enforcement

If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and […]

The post Cost of a data breach: The evolving role of law enforcement appeared first on Security Intelligence.

Continue reading Cost of a data breach: The evolving role of law enforcement

Data never dies: The immortal battle of data privacy

More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly […]

The post Data never dies: The immortal battle of data privacy appeared first on Security Intelligence.

Continue reading Data never dies: The immortal battle of data privacy