Roundup: Federal action that shaped cybersecurity in 2023

As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level. These stories highlight the challenges federal agencies faced in securing digital infrastructure in the […]

The post Roundup: Federal action that shaped cybersecurity in 2023 appeared first on Security Intelligence.

Continue reading Roundup: Federal action that shaped cybersecurity in 2023

NSA Releases New Best Practices for Securing Home Networks

You depend on your home network for binge-watching your favorite shows and ordering the perfect pair of shoes. When it’s time to pay bills or manage your retirement accounts, you likely head online as well. Not to mention that home networks make it possible for you to work from home and for your kids to […]

The post NSA Releases New Best Practices for Securing Home Networks appeared first on Security Intelligence.

Continue reading NSA Releases New Best Practices for Securing Home Networks

How to Compromise a Modern-Day Network

An insidious issue has been slowly growing under the noses of IT admins and security professionals for the past twenty years. As companies evolved to meet the technological demands of the early 2000s, they became increasingly dependent on vulnerable technology deployed within their internal network stack. While security evolved to patch known vulnerabilities, many companies […]

The post How to Compromise a Modern-Day Network appeared first on Security Intelligence.

Continue reading How to Compromise a Modern-Day Network

The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve come to the OSI presentation layer. Here translation, encryption and compression all happen. What Is the Presentation Layer? The simplest way to describe the OSI presentation […]

The post The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

The OSI Model and You Part 2: The Data Link Layer

If the physical layer we talked about earlier in this series about OSI layers is the ‘what’ that allows data to travel, the data link layer is the ‘how.’ In the previous piece of this seven-part series on the OSI model, we described the physical layer and what cybersecurity threats could impact it. Remember, the key […]

The post The OSI Model and You Part 2: The Data Link Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 2: The Data Link Layer

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology […]

The post Securing Your Environment While Working Remotely appeared first on Security Intelligence.

Continue reading Securing Your Environment While Working Remotely

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Connecting remotely is about more than a strong Wi-Fi password and VPN. Be sure to understand and manage the risks of smart devices in your home to bolster personal and enterprise IoT security.

The post Lock Down Personal Smart Devices to Improve Enterprise IoT Security appeared first on Security Intelligence.

Continue reading Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Organizations around the world are adapting to respond to the impact of the novel coronavirus (COVID-19) and companies may experience increased stress and challenges across their security programs arising from increased remote user demand, site availability impacts, stringent travel restrictions and requests for social distancing. Security organizations may also urgently need to deploy critical software […]

The post Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce appeared first on Security Intelligence.

Continue reading Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

Technology has enabled employees to work from the office, from home and pretty much everywhere in between. Unfortunately, many employees still aren’t connecting to secure Wi-Fi, putting data at risk.

The post How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home appeared first on Security Intelligence.

Continue reading How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

Protecting Your Employees’ Home IT From Cyberthreats

Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data.

The post Protecting Your Employees’ Home IT From Cyberthreats appeared first on Security Intelligence.

Continue reading Protecting Your Employees’ Home IT From Cyberthreats