What’s New in the ‘2019 Cost of a Data Breach Report?’

According to the latest Ponemon Institute study, the average cost of a data breach in 2019 is $3.92 million, up 1.5 percent from last year and $3.5 more than in 2014, the first year of the report.

The post What’s New in the ‘2019 Cost of a Data Breach Report?’ appeared first on Security Intelligence.

Continue reading What’s New in the ‘2019 Cost of a Data Breach Report?’

How to Create an Effective Incident Response Plan

Learn how to respond to cybersecurity breaches in three steps. Build an incident response plan, practice implementing it, and orchestrate and automate to make operations more efficient.

The post How to Create an Effective Incident Response Plan appeared first on Security Intelligence.

Continue reading How to Create an Effective Incident Response Plan

FaceApp isn’t taking all of your photos, but the privacy concerns are very real

Using FaceApp to figure out how you’ll look when you’re old and wrinkly may be the viral sensation of the week, but that fun may not be worth it once you look at the fine print. Users don’t have to explicitly click on any user agreement and aren’t forced to read through FaceApp’s privacy policy before using it, but when users apply “old” filters to their photos, they are giving FaceApp license to display their photos worldwide as well as access to location data, according to the fine print. The app does not appear to be uploading users’ full camera rolls in the background, however, as software developer Joshua Nozzi incorrectly claimed on Twitter. After downloading the app, users are prompted with an option to have FaceApp access their camera rolls. This is done so they can select photos to modify with the app. When users select a photo, the app uploads […]

The post FaceApp isn’t taking all of your photos, but the privacy concerns are very real appeared first on CyberScoop.

Continue reading FaceApp isn’t taking all of your photos, but the privacy concerns are very real

Finding New Approaches to Web Application Security

Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

The post Finding New Approaches to Web Application Security appeared first on Security Intelligence.

Continue reading Finding New Approaches to Web Application Security

The NSA is experimenting with machine learning concepts its workforce will trust

As the U.S. National Security Agency incorporates machine learning and artificial intelligence into its defensive cyber operations, officials are weighing whether cyber operators will have confidence in the algorithms underpinning those emerging technologies. NSA operators want to say, “is my AI or ML system explainable?” Neal Ziring, NSA’s Technical Director for Capabilities, told CyberScoop Thursday. “Contexts where the AI is recommending an action is where that will be most important.” The intelligence agency still is exploring how machine learning, an automated method of data analysis, might be used to detect threats and protect new Internet of Things technology. Given the amount of information that agency employees need to sort through, machine learning could help prioritize tasks and decrease the amount of time employees spend on triage. The NSA aims to use machine learning and artificial intelligence, in which computers make their own decisions, to more efficiently stop threats, and eventually leverage those tools in offensive operations. But, if NSA workers don’t trust the […]

The post The NSA is experimenting with machine learning concepts its workforce will trust appeared first on CyberScoop.

Continue reading The NSA is experimenting with machine learning concepts its workforce will trust

Application Security Takeaways From the Ai4 Cybersecurity Conference

While AI in cybersecurity is still in its infancy, the inaugural Ai4 Cybersecurity conference was a great first step in advancing the discussion, especially as it relates to application security.

The post Application Security Takeaways From the Ai4 Cybersecurity Conference appeared first on Security Intelligence.

Continue reading Application Security Takeaways From the Ai4 Cybersecurity Conference

Third-Party Risks Need New Approaches

Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.

The post Third-Party Risks Need New Approaches appeared first on Security Intelligence.

Continue reading Third-Party Risks Need New Approaches

How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?

The post How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering appeared first on Security Intelligence.

Continue reading How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Get Ahead of Cybersecurity AI Maturation by Building a Cognitive SOC

Cybersecurity AI is approaching maturity. Are you prepared to defend against a new wave adversarial machine learning risks?

The post Get Ahead of Cybersecurity AI Maturation by Building a Cognitive SOC appeared first on Security Intelligence.

Continue reading Get Ahead of Cybersecurity AI Maturation by Building a Cognitive SOC

4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise

How does Star Trek’s information security stack up against current cybersecurity hygiene best practices? Turns out the future’s not so bright.

The post 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise appeared first on Security Intelligence.

Continue reading 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise