Why safeguarding sensitive data is so crucial

A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other. The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction […]

The post Why safeguarding sensitive data is so crucial appeared first on Security Intelligence.

Continue reading Why safeguarding sensitive data is so crucial

Addressing growing concerns about cybersecurity in manufacturing

Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in […]

The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

Continue reading Addressing growing concerns about cybersecurity in manufacturing

Achieving peak cyber resilience

Climbing Mount Everest isn’t a feat for the faint hearted. Extreme weather, dangerous terrain and acclimatization requirements make the trek challenging for even the most experienced climbers. It’s estimated that the expedition takes more than two mont… Continue reading Achieving peak cyber resilience

3 proven use cases for AI in preventative cybersecurity

IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million. Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance. Here are three […]

The post 3 proven use cases for AI in preventative cybersecurity appeared first on Security Intelligence.

Continue reading 3 proven use cases for AI in preventative cybersecurity

What NIST’s post-quantum cryptography standards mean for data security

Data security is the cornerstone of every business operation. Today, the security of sensitive data and communication depends on traditional cryptography methods, such as the RSA algorithm. While such algorithms secure against today’s threats, organizations must continue to look forward and begin to prepare against upcoming risk factors. The National Institute of Standards and Technology […]

The post What NIST’s post-quantum cryptography standards mean for data security appeared first on Security Intelligence.

Continue reading What NIST’s post-quantum cryptography standards mean for data security

What NIST’s post-quantum cryptography standards mean for data security

Data security is the cornerstone of every business operation. Today, the security of sensitive data and communication depends on traditional cryptography methods, such as the RSA algorithm. While such algorithms secure against today’s threats, organizations must continue to look forward and begin to prepare against upcoming risk factors. The National Institute of Standards and Technology […]

The post What NIST’s post-quantum cryptography standards mean for data security appeared first on Security Intelligence.

Continue reading What NIST’s post-quantum cryptography standards mean for data security

Best practices on securing your AI deployment

As organizations embrace generative AI, there are a host of benefits that they are expecting from these projects—from efficiency and productivity gains to improved speed of business to more innovation in products and services. However, one factor that forms a critical part of this AI innovation is trust. Trustworthy AI relies on understanding how the […]

The post Best practices on securing your AI deployment appeared first on Security Intelligence.

Continue reading Best practices on securing your AI deployment

What’s behind the 51% drop in ransomware attacks?

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news: ransomware attacks on state and local governments have dropped by 51% in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so […]

The post What’s behind the 51% drop in ransomware attacks? appeared first on Security Intelligence.

Continue reading What’s behind the 51% drop in ransomware attacks?

The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs

Understaffing in cybersecurity — the “skills gap” — is driving up the cost of data breaches in recent years, according to a decade of reports by IBM. The 2024 IBM Data Breach Report found that more than half of breached organizations experienced severe security staffing shortages, a 26.2% increase from the previous year. They found […]

The post The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs appeared first on Security Intelligence.

Continue reading The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs