The Dangerous Flaws of Web3 Security, According To a Former Hacker

“New and improved” is the refrain of progress, but new technology doesn’t always turn out to be an improvement. In the case of the evolution from Web2 to Web3, a former hacker revealed how recent changes have created an all-new avenue of potential attack. Recent updates were intended to tighten security. “Due to blockchain technology […]

The post The Dangerous Flaws of Web3 Security, According To a Former Hacker appeared first on Security Intelligence.

Continue reading The Dangerous Flaws of Web3 Security, According To a Former Hacker

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at […]

The post Threat Management and Unified Endpoint Management appeared first on Security Intelligence.

Continue reading Threat Management and Unified Endpoint Management

What You Should Know About the Honda Key Fob Vulnerability

As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first time and saw all the different ways it linked to my phone or my home WiFi, more than a few red flags went up. I […]

The post What You Should Know About the Honda Key Fob Vulnerability appeared first on Security Intelligence.

Continue reading What You Should Know About the Honda Key Fob Vulnerability

We’re Entering the Age of Unethical Voice Tech

In 2019, Google released a synthetic speech database with a very specific goal: stopping audio deepfakes.  “Malicious actors may synthesize speech to try to fool voice authentication systems,” the Google News Initiative blog reported at the time. “Perhaps equally concerning, public awareness of “deep fakes” (audio or video clips generated by deep learning models) can […]

The post We’re Entering the Age of Unethical Voice Tech appeared first on Security Intelligence.

Continue reading We’re Entering the Age of Unethical Voice Tech

9 Factors to Consider Before Choosing a UEM Solution

The more of your employees who work remotely some or all of the time, the more devices they’re likely to use to conduct business. Employees use their own devices as well as corporate ones, making already-challenged cybersecurity systems more complex. In response, IT teams need to rethink their approach to endpoint management. Changes in endpoint […]

The post 9 Factors to Consider Before Choosing a UEM Solution appeared first on Security Intelligence.

Continue reading 9 Factors to Consider Before Choosing a UEM Solution

Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business leaders in restructuring where and how people go about their jobs.  As much as workers like the hybrid workplace, it presents new challenges to security and IT teams. Management and security […]

The post Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World appeared first on Security Intelligence.

Continue reading Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

Who Is Legally Responsible for a Cyber Incident?

After a company discovers a cyber attack on its network, the finger-pointing begins. The CEO blames the chief information security officer (CISO). The CISO blames the financial officers for not setting aside enough money for cyber defenses. The chief information officer begins to look for a scapegoat further down the supply chain. Maybe they fire […]

The post Who Is Legally Responsible for a Cyber Incident? appeared first on Security Intelligence.

Continue reading Who Is Legally Responsible for a Cyber Incident?

Looking for Cyber Insurance? Know Your Eligibility

Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had to answer a number of questions about my eligibility for such insurance before they would approve me. Nor did the insurance come cheap, but I […]

The post Looking for Cyber Insurance? Know Your Eligibility appeared first on Security Intelligence.

Continue reading Looking for Cyber Insurance? Know Your Eligibility

Protecting Your Data From a Unique Threat: Misinformation

It’s the target for attackers. It drives unique insights and innovation. Data is the most valuable asset your organization has. Now, more than ever before, your company’s information faces a unique threat — one for which many cybersecurity teams aren’t prepared — misinformation. The value of data isn’t lost on most cybersecurity leaders, but data […]

The post Protecting Your Data From a Unique Threat: Misinformation appeared first on Security Intelligence.

Continue reading Protecting Your Data From a Unique Threat: Misinformation

Starting From Scratch: How to Build a Small Business Cybersecurity Program

When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services. However, while it might be helpful to have a managed service provider handle your software […]

The post Starting From Scratch: How to Build a Small Business Cybersecurity Program appeared first on Security Intelligence.

Continue reading Starting From Scratch: How to Build a Small Business Cybersecurity Program