How AIoT Will Reshape the Security Industry in 2023

The Internet of Things (IoT) has been around since 1990 — ever since John Romkey created a toaster that could be switched on over the internet. Today, 66% of North American homes have at least one IoT device, such as a smart speaker, bulb or watch. But for all their conveniences, many IoT devices are […]

The post How AIoT Will Reshape the Security Industry in 2023 appeared first on Security Intelligence.

Continue reading How AIoT Will Reshape the Security Industry in 2023

The Needs of a Modernized SOC for Hybrid Cloud

Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing […]

The post The Needs of a Modernized SOC for Hybrid Cloud appeared first on Security Intelligence.

Continue reading The Needs of a Modernized SOC for Hybrid Cloud

Security at the Masters

The Masters is known for its many timeless traditions. The azaleas of Amen Corner. The Green Jacket. The pimento cheese sandwiches. But there’s also a modern twist with the way the Masters uses data as the foundation of its digital experience, enjoyed by millions around the world through the Masters website and app. However, as […]

The post Security at the Masters appeared first on Security Intelligence.

Continue reading Security at the Masters

Embracing Automation to Unlock New Innovations

My entire career has been driven by automation. I learned early on that automating repetitive tasks using simple scripts allowed me more time to focus on exciting challenges. If I did anything more than twice, I would ask myself if I could automate at least a portion of the process. This approach has benefited me […]

The post Embracing Automation to Unlock New Innovations appeared first on Security Intelligence.

Continue reading Embracing Automation to Unlock New Innovations

Using ChatGPT as an Enabler for Risk and Compliance

Organizations face many challenges regarding cybersecurity, including keeping up with the ever-evolving threat landscape and complying with regulatory requirements. In addition, the cybersecurity skill shortage makes it more difficult for organizations to adequately staff their risk and compliance functions. According to the (ISC)2 2022 Cybersecurity Workforce Study, the global cybersecurity workforce gap has increased by […]

The post Using ChatGPT as an Enabler for Risk and Compliance appeared first on Security Intelligence.

Continue reading Using ChatGPT as an Enabler for Risk and Compliance

How to Defend Against Extortion Groups Like Lapsus$

The hacker group Lapsus$ (sometimes referred to as LAPSUS$ or simply Lapsus) is a relatively newer organization in the cyber arena. The group began to garner public attention in December 2021 after some successful attacks on major corporations, where even the Department of Homeland Security felt it necessary to spend more time researching this group […]

The post How to Defend Against Extortion Groups Like Lapsus$ appeared first on Security Intelligence.

Continue reading How to Defend Against Extortion Groups Like Lapsus$

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience.  Many companies must now protect their systems from more sophisticated threats […]

The post Six Ways to Secure Your Organization on a Smaller Budget appeared first on Security Intelligence.

Continue reading Six Ways to Secure Your Organization on a Smaller Budget

Defining the Cobalt Strike Reflective Loader

The Challenge with Using Cobalt Strike for Advanced Red Team Exercises While next-generation AI and machine-learning components of security solutions continue to enhance behavioral-based detection capabilities, at their core many still rely on signature-based detections. Cobalt Strike being a popular red team Command and Control (C2) framework used by both threat actors and red teams […]

The post Defining the Cobalt Strike Reflective Loader appeared first on Security Intelligence.

Continue reading Defining the Cobalt Strike Reflective Loader

What is the Future of Cyberattacks in 2030 (and Beyond)?

The year is 2030. The world is full of smart mega cities, digital surveillance is openly ubiquitous, cash transactions no longer exist, wired connections remain for only the most demanding data flows, the “Internet of Things” age is over and the “Everything is Internet” age is here, and we churn out data with every heartbeat […]

The post What is the Future of Cyberattacks in 2030 (and Beyond)? appeared first on Security Intelligence.

Continue reading What is the Future of Cyberattacks in 2030 (and Beyond)?