Phishing Used to Get PII, not Just Ransomware

With all of the focus on ransomware attacks, it’s easy to forget about the damage done by email phishing. Yet, new research from Vade shows that phishing has seen a meteoric rise in the first half of 2021, including a 281% increase in May and a 284% i… Continue reading Phishing Used to Get PII, not Just Ransomware

Deepfakes: The Next Big Threat

A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deepfake video. All it takes is a picture of, say, yourself that you’d swap with an actor in a movie or a telev… Continue reading Deepfakes: The Next Big Threat

3 Myths About Threat Actors and Password Safety

You’ve seen the memes and the warnings on social media — answering questions about your life history is ruining your password safety. It’s giving the bad guys the information they need to figure out your passwords and get the answers to your security questions.  But is that true? Are people lurking on social media waiting […]

The post 3 Myths About Threat Actors and Password Safety appeared first on Security Intelligence.

Continue reading 3 Myths About Threat Actors and Password Safety

Propaganda as a Social Engineering Tool

Remember WYSIWYG? What you see is what you get. That was a simpler time in technology; you knew what the end result would be during the development stage. There were no surprises. Technology moved on, though. Now, the mantra should be, “don’t automati… Continue reading Propaganda as a Social Engineering Tool

Reaction to Social Engineering Indicative of Cybersecurity Culture

During COVID-19, threat actors used fear of the virus and hope of a vaccine to trick unwitting victims into downloading malware or giving up their credentials. It was a master class in social engineering, one that put an organization’s security postur… Continue reading Reaction to Social Engineering Indicative of Cybersecurity Culture

How Offensive AI Can Disarm Cybersecurity

As more organizations adopt AI and ML as cybersecurity controls and to detect and deter attacks, cybercriminals are devising ways to use AI as the basis of attacks. “What’s known as ‘offensive AI’ will enable cybercriminals to direct targeted attacks … Continue reading How Offensive AI Can Disarm Cybersecurity

Adding AI/ML to Mobile Security

Many organizations are turning to artificial intelligence (AI) and machine learning (ML) to boost their cybersecurity systems, but you mostly hear about how AI is used to monitor networks and perform the time-consuming tasks that are overwhelming for … Continue reading Adding AI/ML to Mobile Security

Nurturing a Relationship between AI and the Security Team

No matter the industry, adding AI technologies to work processes has made a lot of employees nervous. There is fear that automation is taking over and that robots will eventually push out the human workforce. To quell these fears, it’s the respo… Continue reading Nurturing a Relationship between AI and the Security Team

Choosing the Right AI Components in Your Security Tools

AI is a hot buzzword in cybersecurity, but just because a security tool is labeled “AI-enabled” or “AI-powered” doesn’t mean the technology will translate easily to your cybersecurity system. There is still a lot to learn about AI, said Anne Townsend,… Continue reading Choosing the Right AI Components in Your Security Tools

How to Get on the CISO Certification Path

Cybersecurity workers are very proud of their certifications. Just check their email signatures for the alphabet of them: CISSP (certified information systems security professional), CISM (certified information security manager) and CCISO (certified chief information security officer) to name a few. But does every CISO need a CISO certification? And if you want to be a CISO, […]

The post How to Get on the CISO Certification Path appeared first on Security Intelligence.

Continue reading How to Get on the CISO Certification Path