What is data security posture management?

Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across […]

The post What is data security posture management? appeared first on Security Intelligence.

Continue reading What is data security posture management?

Could a threat actor socially engineer ChatGPT?

As the one-year anniversary of ChatGPT approaches, cybersecurity analysts are still exploring their options. One primary goal is to understand how generative AI can help solve security problems while also looking out for ways threat actors can use the technology. There is some thought that AI, specifically large language models (LLMs), will be the equalizer […]

The post Could a threat actor socially engineer ChatGPT? appeared first on Security Intelligence.

Continue reading Could a threat actor socially engineer ChatGPT?

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. Protect your company from Octo Tempest with these tips. Continue reading Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail to orchestrate the proper resp… Continue reading The dangers of dual ransomware attacks

CISOs struggling to understand value of security controls data

Many CISOs are grappling with the conundrum of the purpose and value of security controls data in supporting critical business decisions, according to Panaseer. The biggest concern when taking on a new CISO role is receiving an inaccurate audit of the … Continue reading CISOs struggling to understand value of security controls data

Endpoint security in the cloud: What you need to know

Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their […]

The post Endpoint security in the cloud: What you need to know appeared first on Security Intelligence.

Continue reading Endpoint security in the cloud: What you need to know

Addressing cyber threats in healthcare operational technology

The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help… Continue reading Addressing cyber threats in healthcare operational technology

What Payroll Documents Do You Need to Pay Employees?

Essential payroll documents like W-2s and time sheets ensure accurate employee payments. Learn what you need for compliance and efficiency. Continue reading What Payroll Documents Do You Need to Pay Employees?

Quantum risk is real now: How to navigate the evolving data harvesting threat

In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the evolving threat landscape. BlackTech is infiltrating routers to gain undetectabl… Continue reading Quantum risk is real now: How to navigate the evolving data harvesting threat