Your Web Applications Are More Vulnerable Than You Think

A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications.

The post Your Web Applications Are More Vulnerable Than You Think appeared first on Security Intelligence.

Continue reading Your Web Applications Are More Vulnerable Than You Think

Faxploiting: Hackers Taking Advantage of the Forgotten Fax Function on Your Printer

There’s a meme making the rounds this week that goes like this: “Can I send you a fax later today?” “You can’t send a fax to where I live.” “Oh, where’s that?” “2018. I live in 2018.” There are similar memes and jokes out there about fax machines beca… Continue reading Faxploiting: Hackers Taking Advantage of the Forgotten Fax Function on Your Printer

Old Technology: We All Use It, But At What Risk?

How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets or laptops from any location in the world. A… Continue reading Old Technology: We All Use It, But At What Risk?

Meeting the Security Challenges for ICS, OT

Operational technology (OT) makes our factories run and ensures the critical infrastructure can fulfill its services. Yet, when we talk about manufacturing and systems in terms of cybersecurity, the focus tends to be on protecting the IT networks, rat… Continue reading Meeting the Security Challenges for ICS, OT

Why Your Organization Should Invest in Cybersecurity Insurance

Despite the rising cost of a data breach, many organizations still believe they don’t need cybersecurity insurance.

The post Why Your Organization Should Invest in Cybersecurity Insurance appeared first on Security Intelligence.

Continue reading Why Your Organization Should Invest in Cybersecurity Insurance

Voting Security: Suggestions to Protect Our Elections

It took an 11 year-old-boy all of 10 minutes to hack into a replica of Florida’s election website and to change the vote count. Think about that for a moment: A sixth grader needed only 10 minutes to be able to change Florida’s hypothetical election r… Continue reading Voting Security: Suggestions to Protect Our Elections

Password Management Remains an Issue — What’s Next?

Common password management habits have been insecure and out-of-date for a while. But despite knowledge of the risks around recycled credentials and other gaps, users have been slow to change tack.

The post Password Management Remains an Issue — What’s Next? appeared first on Security Intelligence.

Continue reading Password Management Remains an Issue — What’s Next?

Third-Party Extensions: The Hidden Security Risk

Third parties are a well-known risk for any company’s cybersecurity posture (just ask Target or dozens of other large enterprise that suffered a data breach due to an outside vendor or consultant security mistake). But we tend to think of third partie… Continue reading Third-Party Extensions: The Hidden Security Risk

Manufacturing: A Rising Target for Cybercriminals

Every morning, I start my day by reading email about the latest cybersecurity news. These emails almost always involve data breaches or malware targeting a retail outlet, a restaurant, a healthcare company or a financial institution. What do these cyb… Continue reading Manufacturing: A Rising Target for Cybercriminals

Identity Is the New Perimeter — But Where’s Its Firewall?

Network and endpoint access procedures have progressed to the point that now identity is the new perimeter of cybersecurity. Improving methods of multifactor authentication is crucial to building trust.

The post Identity Is the New Perimeter — But Where’s Its Firewall? appeared first on Security Intelligence.

Continue reading Identity Is the New Perimeter — But Where’s Its Firewall?