AI Offers Critical Assist to Incident Response

The security skills gap has limited what companies are able to do when it comes to incident investigation and response. And it isn’t just the lack of cybersecurity talent available to hire; security analysts already on staff may not have the specializ… Continue reading AI Offers Critical Assist to Incident Response

Protecting the Hybrid Cloud With Zero-Trust

Cloud security is tough enough, but hybrid cloud adds a few extra challenges, such as visibility between cloud platforms and the difficulty of remaining current with compliance protocols for industry and government regulations. Is zero-trust the answe… Continue reading Protecting the Hybrid Cloud With Zero-Trust

Taking Time Off? What Your Out of Office Message Tells Attackers

As more people are vaccinated and free to live a more normal life again, vacation plans, trip pictures and conference hashtags will flood social media sites. Phone calls and emails to colleagues will be met with out of office (OOO) messages. You might feel happy for that person, or maybe a little jealous that they […]

The post Taking Time Off? What Your Out of Office Message Tells Attackers appeared first on Security Intelligence.

Continue reading Taking Time Off? What Your Out of Office Message Tells Attackers

EOs, Ransomware, and Critical Infrastructure: Q&A with Ryan Weeks

The Ransomware Task Force (RTF) was originally announced in December 2020 as a broad coalition of more than 60 experts in the cybersecurity industry, government, law enforcement and international organizations coming together in the fight against rans… Continue reading EOs, Ransomware, and Critical Infrastructure: Q&A with Ryan Weeks

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name

Your Security Awareness Training Isn’t Working

Humans are the biggest risk to an organization’s cybersecurity posture, and it might be a bigger risk than many realize. According to research from Elevate Security, human behavior had a direct role in 88% of total losses in the largest cybersecurity … Continue reading Your Security Awareness Training Isn’t Working

Improving Data Security in Schools: Remote Learning Increases Security Threats

This blog is the last in a series about improving data security in schools. When learning moved from the classroom to the dining room, schools scrambled to ensure students had the tools they needed. A study conducted by FutureSource Consulting found that the number of computing devices shipped to educational institutions in 2020 is expected […]

The post Improving Data Security in Schools: Remote Learning Increases Security Threats appeared first on Security Intelligence.

Continue reading Improving Data Security in Schools: Remote Learning Increases Security Threats

New Hires Speak Out about Cybersecurity Job Expectations

No one really knows what to expect when they first start a new job, especially someone fresh out of college or starting a new career. When that new career is cybersecurity, here’s a little secret – the people doing the hiring probably aren’t totally c… Continue reading New Hires Speak Out about Cybersecurity Job Expectations

Improving Data Security in Schools: Privacy at a Distance

This blog is the second in a series about improving data security in schools. Cyberattacks against colleges and universities can be fruitful. Few organizations hold the amount and variety of data that higher education does. Thousands, if not millions, of endpoints are ripe for compromise. A large state flagship university houses decades worth of student […]

The post Improving Data Security in Schools: Privacy at a Distance appeared first on Security Intelligence.

Continue reading Improving Data Security in Schools: Privacy at a Distance

Contextual Biometrics for Improved Application Security

Securing mobile devices and mobile applications is a nuisance. Security best practices dictate having authentication methods to log in and open the device, and that users should log off every app after each use. Best practices, however, are inconvenie… Continue reading Contextual Biometrics for Improved Application Security