Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an […]

The post Cybersecurity 101: What is Attack Surface Management? appeared first on Security Intelligence.

Continue reading Cybersecurity 101: What is Attack Surface Management?

How SASE Can Stop Cyberattackers in Their Tracks

SASE is emerging as a way to defeat cybercriminals by preventing malware from accessing the corporate network Organized crime and criminal groups are increasing the pressure on enterprises in the form of cyberattacks. For most, the pre-eminent tool of… Continue reading How SASE Can Stop Cyberattackers in Their Tracks

Cybersecurity 2020: Innovate or Surrender the Digital Economy

Cyberattacks are becoming easier to carry out and will threaten the digital economy unless businesses innovate Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. That’s a bold statement, but not wi… Continue reading Cybersecurity 2020: Innovate or Surrender the Digital Economy

5G and IoT: How to Approach the Security Implications

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included). Continue reading 5G and IoT: How to Approach the Security Implications

New Research Leverages AI for Side-Channel Automated Keystroke Attack

A newly discovered keystroke side-channel attack has been discovered in Israel, at Ben-Grion University of the Negev. Monikered ‘Malboard’, the group comprised of Nitzan Farhi, Dr. Yuval Elovici, Ph.D. and led by Dr. Nir Nissim, Ph.D., Director of the… Continue reading New Research Leverages AI for Side-Channel Automated Keystroke Attack

New Attack Vectors Brought by the Cloud and AWS

By 2021, Cisco expects 94 percent of workloads and compute instances to be processed by cloud data centers. Attackers are already starting to focus and targeting cloud accounts, moving away from traditional data centers. For an attacker, breaching a s… Continue reading New Attack Vectors Brought by the Cloud and AWS

Printer Vectored Network Attacks Gives New Meaning To Paper Jams

Seemingly yearly, we see new printer vectored network attacks due to slovely written code in the printer or the offending machine’s drives. Here’s the latest debacle courtesy of Hacker Noon on their Medium blog.

‘Hacking unsecured printers is easy. U… Continue reading Printer Vectored Network Attacks Gives New Meaning To Paper Jams