Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

Rapid7’s Jaya Baloo says a deficit in Australian organisational IT asset and vulnerability understanding is helping threat actors, and this is being exacerbated by fast growth in multicloud environments. Continue reading Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

Cybersecurity: How Can Companies Benefit From FBI and Homeland Security Collaboration?

Agents of the FBI and Homeland Security at the Northeast Cybersecurity Summit revealed how cyberintelligence collaboration works. Learn more with our article. Continue reading Cybersecurity: How Can Companies Benefit From FBI and Homeland Security Collaboration?

With 40% of Log4j Downloads Still Vulnerable, Security Retrofitting Needs to Be a Full-Time Job

Vulnerabilities like Log4j remain responsible for security breaches a full year after the discovery of the flaw. In the months after widespread reporting about the vulnerability, 40% of Log4j downloads remained vulnerable to exploitation. Rapid Response — by Both Security Teams and Hackers What made this exposure so damaging was how widespread this piece of […]

The post With 40% of Log4j Downloads Still Vulnerable, Security Retrofitting Needs to Be a Full-Time Job appeared first on Security Intelligence.

Continue reading With 40% of Log4j Downloads Still Vulnerable, Security Retrofitting Needs to Be a Full-Time Job

Tech news you may have missed: Nov. 10 – 17

This week’s trending news features a primer on Industrial IoT, new and upcoming features for Windows users and the latest cybersecurity threats.
The post Tech news you may have missed: Nov. 10 – 17 appeared first on TechRepublic.
Continue reading Tech news you may have missed: Nov. 10 – 17

Top 7 Cybersecurity Threats for 2024

2024 will be a pivotal year for cybersecurity. The global threat landscape is undergoing deep transformations, driven by emerging technologies, new tactics and shifting geopolitical dynamics. Continue reading Top 7 Cybersecurity Threats for 2024

3 Reasons Why Technology Integration Matters

As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain tight-lipped in a lot of data breach cases. Much like the way a vaccine can […]

The post 3 Reasons Why Technology Integration Matters appeared first on Security Intelligence.

Continue reading 3 Reasons Why Technology Integration Matters

How and Why Do Teens Become Cyber Criminals?

The search to find the mastermind of the attacker group Lapsus$ led to a home outside Oxford, England. The suspected leader was a 16-year-old. He helped take down some of the world’s biggest companies, including Microsoft, from his mother’s house. The BBC reported the teen is alleged to have earned $14 million from his attacks. […]

The post How and Why Do Teens Become Cyber Criminals? appeared first on Security Intelligence.

Continue reading How and Why Do Teens Become Cyber Criminals?

Everything CISOs Need to Know About NIST

It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020. Without a plan, maintaining a robust security posture is an uphill struggle.  Thankfully, the National Institute of Standards and Technology (NIST) offers CISOs the guidance they need. Read on to learn […]

The post Everything CISOs Need to Know About NIST appeared first on Security Intelligence.

Continue reading Everything CISOs Need to Know About NIST

The Best Threat Hunters Are Human

“You won’t know you have a problem unless you go and look.” Neil Wyler, who is known as ‘Grifter’ in the hacker community, made that statement as a precursor to an unforgettable story. An organization hired Grifter to perform active threat hunting. In a nutshell, active threat hunting entails looking for an attacker inside an […]

The post The Best Threat Hunters Are Human appeared first on Security Intelligence.

Continue reading The Best Threat Hunters Are Human

Top Cybersecurity Threats Around the Globe

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives.  Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch […]

The post Top Cybersecurity Threats Around the Globe appeared first on Security Intelligence.

Continue reading Top Cybersecurity Threats Around the Globe