Why safeguarding sensitive data is so crucial

A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other. The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction […]

The post Why safeguarding sensitive data is so crucial appeared first on Security Intelligence.

Continue reading Why safeguarding sensitive data is so crucial

Malicious Reconnaissance: What It Is and How To Stop It

You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.  Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to […]

The post Malicious Reconnaissance: What It Is and How To Stop It appeared first on Security Intelligence.

Continue reading Malicious Reconnaissance: What It Is and How To Stop It

Switching to 5G? Know Your Integrated Security Controls

5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content delivery and digital engagement anywhere. It enables businesses with new use cases and integrated security needs to have a trusted network and application/data delivery function. How does one build a secure 5G network that provides […]

The post Switching to 5G? Know Your Integrated Security Controls appeared first on Security Intelligence.

Continue reading Switching to 5G? Know Your Integrated Security Controls

Will the Metaverse Usher in a Universe of Security Challenges?

How much do you know about the metaverse?  Everyone started talking about the metaverse in the summer of 2021. Facebook CEO Mark Zuckerberg kicked it off with his plan to focus his company on building what he imagined would be the future of social, business, leisure and culture: the metaverse. He even changed the name […]

The post Will the Metaverse Usher in a Universe of Security Challenges? appeared first on Security Intelligence.

Continue reading Will the Metaverse Usher in a Universe of Security Challenges?

It’s Not Too Soon to Start Talking About 6G

We may be only a short time into 5G deployments, but discussions of the impact 6G technology will have on our lives have already started. In late 2020, the Alliance for Telecommunications Industry Solutions created a new group called the Next G Alliance to “advance North American mobile technology leadership over the next decade through […]

The post It’s Not Too Soon to Start Talking About 6G appeared first on Security Intelligence.

Continue reading It’s Not Too Soon to Start Talking About 6G

Edge Computing and 5G: Will Security Concerns Outweigh Benefits?

You’re probably hearing a bunch of chatter about edge computing these days and how it, along with 5G, are the latest pieces of technology to redefine how we conduct our business. In fact, you may even be hearing people say that edge computing will replace cloud computing. Let’s separate the facts from the speculation.  What […]

The post Edge Computing and 5G: Will Security Concerns Outweigh Benefits? appeared first on Security Intelligence.

Continue reading Edge Computing and 5G: Will Security Concerns Outweigh Benefits?

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and […]

The post How Do You Plan to Celebrate National Computer Security Day? appeared first on Security Intelligence.

Continue reading How Do You Plan to Celebrate National Computer Security Day?

Private 5G Security: Consider Security Risks Before Investing

So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]

The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.

Continue reading Private 5G Security: Consider Security Risks Before Investing

Network Operators Must Automate Their Way to 5G

Artificial intelligence (AI) has crept into many aspects of our lives, from Google Maps to Alexa to our cars. At the same time, we rely more and more on internet of things (IoT) devices such as smart locks and dishwashers. So much so that the trinity … Continue reading Network Operators Must Automate Their Way to 5G