Cybersecurity Trends: IBM’s Predictions for 2022

After the challenging year of 2021, we look forward to what’s next in 2022. Over the past two years, we’ve seen a tremendous shift in how consumers and businesses accomplish tasks with the continued shift to digital and cloud. As a result of disappearing perimeters and increased digital data, cybersecurity attacks have, not surprisingly, increased. […]

The post Cybersecurity Trends: IBM’s Predictions for 2022 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends: IBM’s Predictions for 2022

Insider Threats: How to Combat Workplace Disinformation

Who hasn’t heard about disinformation or fake news? And for those responsible for security, who hasn’t heard about the risk of insider threats? Both issues are well known, but how disinformation can affect cyber risk management might not be so obvious.  This article won’t tell you who’s right or wrong in a political debate. Instead, […]

The post Insider Threats: How to Combat Workplace Disinformation appeared first on Security Intelligence.

Continue reading Insider Threats: How to Combat Workplace Disinformation

Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the enterprise, armed with more resources, could sustain the shock. […]

The post Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource appeared first on Security Intelligence.

Continue reading Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

What Cybersecurity Professionals Are Wishing for This Holiday Season

After another tough year in the cybersecurity trenches, security professionals deserve a well-earned holiday, along with some powerful gifts to help them cope with the new year’s daunting threat landscape and the security challenges to come.  Here’s our rundown of what cybersecurity professionals are wishing for this holiday season.  1. An Artificial Intelligence Ethical Hacking […]

The post What Cybersecurity Professionals Are Wishing for This Holiday Season appeared first on Security Intelligence.

Continue reading What Cybersecurity Professionals Are Wishing for This Holiday Season

How to Include Cybersecurity Training in Employee Onboarding

Bringing new employees up to speed on company policies and procedures, or employee onboarding, is standard practice. The process covers topics like what’s expected in daily work, proper communication channels and vacation and sick leave policies. In well-prepared companies, it also includes extensive cybersecurity training. Quality employee cybersecurity training, along with ongoing training for existing […]

The post How to Include Cybersecurity Training in Employee Onboarding appeared first on Security Intelligence.

Continue reading How to Include Cybersecurity Training in Employee Onboarding

Top 20 Most Common Hacker Behaviors

The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers When the OWASP Top 20 Vulnerabilities was first published it revolutionized our industry’s approach to vulnerability management. Instead of playing wack-a-mole with thousa… Continue reading Top 20 Most Common Hacker Behaviors

What the IT world needs now: fast access to any app, anywhere, securely!

I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of our lives – both physically and virtually – it also gives us a glimpse into the… Continue reading What the IT world needs now: fast access to any app, anywhere, securely!