Why You Need Attack Surface Management (And How To Achieve It)

Attack surface management (ASM) has rightly become a major priority for business leaders and digital defenders alike. The number of connected things is growing, and that means attackers have far more entryways into your networks and systems. With ASM, you can respond proactively to threats to stop them before they start. What is ASM?  So, […]

The post Why You Need Attack Surface Management (And How To Achieve It) appeared first on Security Intelligence.

Continue reading Why You Need Attack Surface Management (And How To Achieve It)

Ransomware Attacks in 2021: Information Meets Emotion

“If you want to go quickly, go alone, but if you want to go far, go together.”  This African proverb opens the Sophos 2021 Threat Report, and in view of recent cybersecurity events, its meaning is very important when it comes to defending against ransomware attacks. As threat actors work together to provide ransomware-as-a-service, defenders […]

The post Ransomware Attacks in 2021: Information Meets Emotion appeared first on Security Intelligence.

Continue reading Ransomware Attacks in 2021: Information Meets Emotion

Cybersecurity Trends and Emerging Threats in 2021

The year 2021 is finally here, bringing with it the promise of a brighter future — but a long road ahead. In this piece, we’ll dive into five cybersecurity trends that pose significant potential risk in 2021 and offer practical advice to help entities reduce overall risk. The first quarter of 2021 represents a cybersecurity […]

The post Cybersecurity Trends and Emerging Threats in 2021 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends and Emerging Threats in 2021

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% of organizations also […]

The post Build a Roadmap for Cyber Resilience appeared first on Security Intelligence.

Continue reading Build a Roadmap for Cyber Resilience

Mitigating Containers Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliver more power […]

The post Mitigating Containers Risk Requires a Comprehensive Approach appeared first on Security Intelligence.

Continue reading Mitigating Containers Risk Requires a Comprehensive Approach

Deciphering Between Incident Management and Crisis Management

Cyber threats come in many forms and can severely impact business operations, brand reputation, financial standing and even lead to a lawsuit. Organizations must prepare to respond and manage cyber events at different organizational levels to limit their damage and accelerate recovery. Most businesses focus on incident management or crisis management to react to cyber […]

The post Deciphering Between Incident Management and Crisis Management appeared first on Security Intelligence.

Continue reading Deciphering Between Incident Management and Crisis Management

The Past, Present and Future of Security Information and Event Management (SIEM)

Security information and event management (SIEM) was originally designed to help organizations achieve and maintain compliance, but over the years, it’s evolved to become so much more.

The post The Past, Present and Future of Security Information and Event Management (SIEM) appeared first on Security Intelligence.

Continue reading The Past, Present and Future of Security Information and Event Management (SIEM)

What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

Reading Time: 4 minutes Companies are constrained by insufficient time and resources to detect and respond to advanced persistent threats (APTs). How can SOCs fill the gaps and keep advanced attackers out of their networks?

The post What Are Advanced Persistent Threats (APTs), and How Do You Find Them? appeared first on Security Intelligence.

Continue reading What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

Take a Proactive Approach to the Darknet Threat

A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.

The post Take a Proactive Approach to the Darknet Threat appeared first on Security Intelligence.

Continue reading Take a Proactive Approach to the Darknet Threat

The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?

When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019.

The post The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts? appeared first on Security Intelligence.

Continue reading The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?