Taking a Data-Centric Approach to Cloud Security

The pandemic and resulting migration to remote work emphasized the importance of having a digital transformation process in place. The companies that did so appeared to be the companies that had the smoothest transition. Cloud computing played a pivot… Continue reading Taking a Data-Centric Approach to Cloud Security

Credential Stuffing: AI’s Role in Slaying a Hydra

One data breach can lead to another. Because so much of the data stolen in breaches ends up for sale on the dark web, a threat actor can purchase authentication credentials — the emails and passwords — of the organization’s employees without having to steal them directly. With that information in hand, threat actors have […]

The post Credential Stuffing: AI’s Role in Slaying a Hydra appeared first on Security Intelligence.

Continue reading Credential Stuffing: AI’s Role in Slaying a Hydra

Remote Work Needs a More Secure Cloud

Cloud computing was vital to the success of remote work initiatives during the pandemic. However, the cloud is having a bit of a security crisis right now, caused in part because of the swift transition to remote work. According to a new cloud securit… Continue reading Remote Work Needs a More Secure Cloud

Balancing Security and User Behavior in Remote Work

Just when security was finally being recognized as a priority within business operations, remote work hit what amounted to a giant reset button. As work from home (WFH) became necessary, productivity was prioritized over everything else. Getting emplo… Continue reading Balancing Security and User Behavior in Remote Work

Hybrid Cloud Adoption Brings Security on the Go

Hybrid cloud environments are a common sight in today’s digital world. IBM’s Assembling Your Cloud Orchestra report found 85% of organizations already utilize a hybrid cloud and 98% anticipate having one in place within three years. This type of cloud environment allows for more agile business processes, a novel infrastructure and produces potential new revenue […]

The post Hybrid Cloud Adoption Brings Security on the Go appeared first on Security Intelligence.

Continue reading Hybrid Cloud Adoption Brings Security on the Go

5 Cybersecurity Best Practices For Planning Ahead

Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against our best efforts. The talent shortage looms the largest; there simply aren’t enough qualified cybersecurity experts out there to provide organizations a strong foundation. Without a […]

The post 5 Cybersecurity Best Practices For Planning Ahead appeared first on Security Intelligence.

Continue reading 5 Cybersecurity Best Practices For Planning Ahead

Data Privacy Day: Understanding COVID-19’s Impact

Data Privacy Day is Jan. 28, just like it does every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alli… Continue reading Data Privacy Day: Understanding COVID-19’s Impact

How Working From Home Has Changed Cybersecurity Awareness Training

Some of the most surprising news coming out of 2020 — a year when it seemed like there was a major breaking story every day — is the number of data breaches decreased during the first nine months of the year.  This is the exact opposite of what experts expected. The security concerns as millions […]

The post How Working From Home Has Changed Cybersecurity Awareness Training appeared first on Security Intelligence.

Continue reading How Working From Home Has Changed Cybersecurity Awareness Training

Biometrics: Choosing the Right Option for Your Security

Do you know who your customers are? Not their demographics, but each customer as they enter your online portal and provide their name, address and credit card number. Or, what about the customer who requests the right to be forgotten and have personal information deleted from your system? Identity verification is required in many, if […]

The post Biometrics: Choosing the Right Option for Your Security appeared first on Security Intelligence.

Continue reading Biometrics: Choosing the Right Option for Your Security

Online Gaming Adds More Risk to WFH

During the holiday season, with virtual learning on a break, it’s a good bet your kids spent much of their downtime playing video games. Maybe they received a new gaming console as a Christmas gift or they use a gaming platform as a way to hang … Continue reading Online Gaming Adds More Risk to WFH