Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late

To defend your infrastructure against future exploits, it’s critical to disable the insecure original version of the SMB protocol.

The post Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late appeared first on Security Intelligence.

Continue reading Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late

Big Changes Around the Corner for the IoT

The IoT is transforming before our eyes due to increasing regulations, growing demand for security standards and advancements in the telecom industry.

The post Big Changes Around the Corner for the IoT appeared first on Security Intelligence.

Continue reading Big Changes Around the Corner for the IoT

Architectures for Securing IT Systems

IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.

The post Architectures for Securing IT Systems appeared first on Security Intelligence.

Continue reading Architectures for Securing IT Systems

Architectures for Securing IT Systems

IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.

The post Architectures for Securing IT Systems appeared first on Security Intelligence.

Continue reading Architectures for Securing IT Systems

Information Overload — Now What?

Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.

The post Information Overload — Now What? appeared first on Security Intelligence.

Continue reading Information Overload — Now What?

Cheap Shock: Why Shellshock Is Still a Thing

Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.

The post Cheap Shock: Why Shellshock Is Still a Thing appeared first on Security Intelligence.

Continue reading Cheap Shock: Why Shellshock Is Still a Thing

Making the Move to an All-HTTPS Network

There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it’s not as simple as swapping one protocol for another.

The post Making the Move to an All-HTTPS Network appeared first on Security Intelligence.

Continue reading Making the Move to an All-HTTPS Network

X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity

IBM’s X-Force Red team delivers the offensive security capabilities organizations need to protect against and respond to advanced targeted attacks.

The post X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity appeared first on Security Intelligence.

Continue reading X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity

The Zero Trust Model for Living in a Hacked World

The zero trust model requires IT managers to abandon the “trust but verify” concept and manage user access according to a strategy of least privilege.

The post The Zero Trust Model for Living in a Hacked World appeared first on Security Intelligence.

Continue reading The Zero Trust Model for Living in a Hacked World