Threats Are Increasing, but Security Budgets, Staff Aren’t

The age-old problem of misaligned security budgets and staffing continues, but they may not be the answer to solving the most pressing security issues. I didn’t go to Black Hat USA this year, but I’ve heard some chatter about the show. One person told… Continue reading Threats Are Increasing, but Security Budgets, Staff Aren’t

Personality Traits: Key to More Effective Security Training?

Organizations that understand their employees’ personality types could better shape their security awareness training, research shows We know that employees are one of the biggest threats—whether accidentally or through malicious intent—to netwo… Continue reading Personality Traits: Key to More Effective Security Training?

5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Continue reading 5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Ransomware Attacks Shift Tactics

I’ve seen a number of reports over the past few months saying that ransomware attacks are on the decline. The IBM X-Force Threat Intelligence Index, for example, saw a significant drop in ransomware, as cybercriminals aren’t using this type of attack … Continue reading Ransomware Attacks Shift Tactics

How Implementing Cloud Identity Can Improve Security and Data Privacy

Reading Time: 3 minutes Digital transformation is changing everything in the business world, including customer relations. Cloud identity can make those transactions more secure and private.

The post How Implementing Cloud Identity Can Improve Security and Data Privacy appeared first on Security Intelligence.

Continue reading How Implementing Cloud Identity Can Improve Security and Data Privacy

Ethical Hackers: The Good Guys Your Company Needs

Hackers have a bad reputation. A lot of that is deserved, as there are plenty of bad guys out there who want to dig into your network to steal as much data as possible for their financial gain. But there are also good hackers out there, and we can’t f… Continue reading Ethical Hackers: The Good Guys Your Company Needs

Assessing the Risk of the Former Employee

Employees leaving a company can pose a real risk to the security of an organization Many years ago, I left a job to take a new position. Several weeks after I made the move, I was searching for some information and realized that it may have been in my… Continue reading Assessing the Risk of the Former Employee

The Problem With Bots and What To Do About Them

Could California Senate Bill 1001 deal a blow to bots? California has certainly taken the lead when it comes to data privacy and internet security. There has been a lot of chatter surrounding California’s Consumer Protection Act (CCPA) and its i… Continue reading The Problem With Bots and What To Do About Them

Why Security Incidents Often Go Underreported

If you saw a coworker browsing through a database they weren’t supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.

The post Why Security Incidents Often Go Underreported appeared first on Security Intelligence.

Continue reading Why Security Incidents Often Go Underreported

Tackling the Issue of Online Gaming Credential Stuffing

When it comes to cyberattacks, what causes them and the risks they pose, our attention focuses primarily on the most vital industry verticals: financial, health care, commerce and government. So when I sat in on a session about Akamai’s recently relea… Continue reading Tackling the Issue of Online Gaming Credential Stuffing