How to Compromise a Modern-Day Network

An insidious issue has been slowly growing under the noses of IT admins and security professionals for the past twenty years. As companies evolved to meet the technological demands of the early 2000s, they became increasingly dependent on vulnerable technology deployed within their internal network stack. While security evolved to patch known vulnerabilities, many companies […]

The post How to Compromise a Modern-Day Network appeared first on Security Intelligence.

Continue reading How to Compromise a Modern-Day Network

Black Basta Besting Your Network?

This post was written with contributions from Chris Caridi and Kat Weinberger. IBM Security X-Force has been tracking the activity of Black Basta, a new ransomware group that first appeared in April 2022. To date, this group has claimed attribution of 29 different victims across multiple industries using a double extortion strategy where the attackers […]

The post Black Basta Besting Your Network? appeared first on Security Intelligence.

Continue reading Black Basta Besting Your Network?

Threat Modeling: The Key to Dealing With 5G Security Challenges

With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed […]

The post Threat Modeling: The Key to Dealing With 5G Security Challenges appeared first on Security Intelligence.

Continue reading Threat Modeling: The Key to Dealing With 5G Security Challenges

The OSI Model and You Part 7: Stopping Threats at the Application Layer

A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for system interconnection and networking. It has been very useful in that regard, but we have to be aware a lot has changed since its inception. […]

The post The OSI Model and You Part 7: Stopping Threats at the Application Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 7: Stopping Threats at the Application Layer

The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve come to the OSI presentation layer. Here translation, encryption and compression all happen. What Is the Presentation Layer? The simplest way to describe the OSI presentation […]

The post The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we are past just connecting devices. Now, we need to do something with that connection, which at this stage is called a session. This part of […]

The post The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer

As we’ve talked about in the rest of this series, there are several ways to use the Open Systems Interconnection (OSI) seven layers of networking model to help us secure our networks and make them more resilient. Now, we’ve reached the first of the ‘host’ layers, the OSI transport layer.  Previously, we described ‘what’ allows data […]

The post The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer

The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer

Networking models help us understand the ‘lay of the land’ when it comes to protecting the network. In our journey through the Open Systems Interconnection (OSI) framework, we’ve arrived at the last stop in the media group, the OSI network layer. Remember, we’ve gotten here via the OSI data link layer, or the ‘how’ the […]

The post The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer

The OSI Model and You Part 1: Stopping Threats on the OSI Physical Layer

The Open Systems Interconnection (OSI) model is one of the many useful tools we can use to stop cybersecurity threats. This long-standing standard separates a network into seven layers, offering suggestions for protecting each of them. In this blog series, we’ll examine the layers one by one to understand this model. Each piece follows the same […]

The post The OSI Model and You Part 1: Stopping Threats on the OSI Physical Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 1: Stopping Threats on the OSI Physical Layer

Network Segmentation Series: What is It?

This is the first in a series of three blog posts about network segmentation.  Many businesses are looking to augment their defenses by changing their approach to network security. Take the heightened awareness around building zero trust networks, for instance. Embracing the shift to zero trust will require users to address the threat of lateral movement. […]

The post Network Segmentation Series: What is It? appeared first on Security Intelligence.

Continue reading Network Segmentation Series: What is It?