Data Poisoning: When Attackers Turn AI and ML Against You

Stopping ransomware has become a priority for many organizations. So, they are turning to artificial intelligence (AI) and machine learning (ML) as their defenses of choice. However, threat actors are also turning to AI and ML to launch their attacks. One specific type of attack, data poisoning, takes advantage of this. Why AI and ML Are at […]

The post Data Poisoning: When Attackers Turn AI and ML Against You appeared first on Security Intelligence.

Continue reading Data Poisoning: When Attackers Turn AI and ML Against You

Web Application Security’s Lost Year

It’s been over a year now since everything shut down. As we enter into the second spring of the pandemic, organizations are able to better evaluate what worked and what didn’t as they unexpectedly transitioned to remote work. One area that suffered wa… Continue reading Web Application Security’s Lost Year

Why Business Password Management Remains a Struggle

How secure is your password? Everyone has a favorite. Savvy people, of course, know better than to use something that can be easily guessed, like 12345 or ‘Password.’ But, once you latch on to a password you really like and is easy to remember, you use it again on a site you might not visit […]

The post Why Business Password Management Remains a Struggle appeared first on Security Intelligence.

Continue reading Why Business Password Management Remains a Struggle

Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction

It’s just part of the job: at some point in a device’s lifecycle, data must be destroyed. While deleting files may mean users and apps can’t access them, simple deletion isn’t enough to truly destroy the data. To be most effective, secure data destruction has to be complete. This is especially true when your organization […]

The post Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction appeared first on Security Intelligence.

Continue reading Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction

Majority of Mobile App Vulnerabilities From Open Source Code

COVID-19 has impacted everything over the past year, and mobile app security is no exception. The Synopsys Cybersecurity Research Center (CyRC) took an in-depth look at application security, and discovered just how vulnerable apps that use open source… Continue reading Majority of Mobile App Vulnerabilities From Open Source Code

Mitigating Threats to the Application Layer

Traditionally, security systems and cybersecurity efforts focused on infrastructure, and often worked in silos separate from application developers. This approach often left applications vulnerable and susceptible to attack, and cybercriminals are tak… Continue reading Mitigating Threats to the Application Layer

Securing Vaccine Passport Applications

The single most valuable document today is a COVID-19 vaccination card. That golden ticket is the passport to a ‘normal’ life. If you are lucky enough to have one of those cards, however, you know already how awkward they are to carry arou… Continue reading Securing Vaccine Passport Applications

Taking a Security-First Approach to Cloud Migration

The pandemic and lockdowns hit their first anniversary mark, and many companies continue to have their employees work from home for the foreseeable future. Over the past year, organizations have seen how important cloud computing is to business operat… Continue reading Taking a Security-First Approach to Cloud Migration

Using IAM Solutions to Beat Deepfakes and Fraud

AI and ML technologies have made great strides in helping organizations with cybersecurity, as well as with other tasks like chatbots that help with customer service. Cybercriminals have also made great strides in using AI and ML for fraud. “Today, fr… Continue reading Using IAM Solutions to Beat Deepfakes and Fraud

Stop Password Reuse by Going Passwordless

There’s a t-shirt that reads, “My password is the last 20 digits of Pi.” It’s funny – who would ever guess that? – but every single password generator would flag that password as “weak.” There are no letters or symbols, and that would create a passwor… Continue reading Stop Password Reuse by Going Passwordless