Data Breach Protection Must Include Physical Security

If most of your business’ data and workloads are handled on public clouds, it can be easy to forget about the onsite servers. With office buildings empty, employees may assume the servers are protected by the same physical security as the rest of the facility. However, physical security has its own considerations, and paying careful […]

The post Data Breach Protection Must Include Physical Security appeared first on Security Intelligence.

Continue reading Data Breach Protection Must Include Physical Security

Misinformation Campaigns Rise Thanks to COVID-19

Misinformation abounds during the pandemic. Vigilance and skepticism are the best defense In late January, Clint Watts, senior fellow at the Center for Cyber and Homeland Security at George Washington University and a Foreign Policy Research Institute… Continue reading Misinformation Campaigns Rise Thanks to COVID-19

There But Not There: Phishing Emails Using Invisible Text

We’re used to hackers slipping malicious links and attachments into phishing emails. That doesn’t mean there aren’t the occasional slip-ups that result in malware infections, but for the most part, cyber-savvy users recognize the tricks used to fool t… Continue reading There But Not There: Phishing Emails Using Invisible Text

Your Newest Cybersecurity Professional Is Already in Your Company

The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021. The cybersecurity profession hit a 0% unemployment rate and the pay is good. So, why are security leaders struggling to fill positions? It could be because they are […]

The post Your Newest Cybersecurity Professional Is Already in Your Company appeared first on Security Intelligence.

Continue reading Your Newest Cybersecurity Professional Is Already in Your Company

Threat Modeling in a Container Environment

As organizations turn to hybrid solutions, an increasing number of businesses are turning to container orchestration to provide a seamless solution to computing between environments. “Containers are units of software in which the code and all its dependencies are packed, allowing applications to run quickly and efficiently from one computing environment to another,” Container Journal explains. […]

The post Threat Modeling in a Container Environment appeared first on Security Intelligence.

Continue reading Threat Modeling in a Container Environment

Stress, Age Play Role in Cyber Mistakes

Human error is known to play a major role in cybersecurity attacks, but why are humans making so many mistakes? That’s what a new study from Tessian investigated, and the results could help cybersecurity teams better address data and network protectio… Continue reading Stress, Age Play Role in Cyber Mistakes

Legacy Systems: Seven Things to Know When Sunsetting

Nothing lasts forever. That’s true for cars, devices, even a favorite sweatshirt or pair of jeans. But it is especially true for information technology (IT).  Legacy IT systems stick around in business settings for three main reasons: organizations don’t have the budget to upgrade, teams need to be able to access critical legacy applications and […]

The post Legacy Systems: Seven Things to Know When Sunsetting appeared first on Security Intelligence.

Continue reading Legacy Systems: Seven Things to Know When Sunsetting

IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts

IT workers may have had the toughest transition to the WFH model. Not only were they tasked with preparing entire organizations for remote work, setting them up with the right equipment and ensuring access to the right technologies and software—and do… Continue reading IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts

Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business and […]

The post Vendor Management: 7 Tips for Security During Remote Work appeared first on Security Intelligence.

Continue reading Vendor Management: 7 Tips for Security During Remote Work

The Future of Work: WFH Changing Cybersecurity

As we hit the six-month point of work from home (WFH) orders and seven months since COVID-19 first knowingly made its appearance in the U.S., workplaces continue to struggle with many uncertainties. But one thing we know for sure is the virus has chan… Continue reading The Future of Work: WFH Changing Cybersecurity