The Zero Trust Model for Living in a Hacked World

The zero trust model requires IT managers to abandon the “trust but verify” concept and manage user access according to a strategy of least privilege.

The post The Zero Trust Model for Living in a Hacked World appeared first on Security Intelligence.

Continue reading The Zero Trust Model for Living in a Hacked World

Secure SD-WAN: The First Step Toward Zero Trust Security

A secure SD-WAN can help companies reduce costs, simplify cloud connectivity and secure their networks. This is the first step toward zero trust security.

The post Secure SD-WAN: The First Step Toward Zero Trust Security appeared first on Security Intelligence.

Continue reading Secure SD-WAN: The First Step Toward Zero Trust Security

Know Your Security Loopholes to Outsmart Lurking Cyberthreats

IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.

The post Know Your Security Loopholes to Outsmart Lurking Cyberthreats appeared first on Security Intelligence.

Continue reading Know Your Security Loopholes to Outsmart Lurking Cyberthreats

How to Ensure the Success of a Hot Desking Strategy

A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.

The post How to Ensure the Success of a Hot Desking Strategy appeared first on Security Intelligence.

Continue reading How to Ensure the Success of a Hot Desking Strategy

Don’t Let Remote Management Software Contribute to Building Botnets

IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.

The post Don’t Let Remote Management Software Contribute to Building Botnets appeared first on Security Intelligence.

Continue reading Don’t Let Remote Management Software Contribute to Building Botnets

User Behavior Analytics: Perfect for Analysis but Not Security

User behavior analytics are great for identifying and monitoring cyberthreats, but not for defending or recovering critical assets.

The post User Behavior Analytics: Perfect for Analysis but Not Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: Perfect for Analysis but Not Security

User Behavior Analytics: Perfect for Analysis but Not Security

User behavior analytics are great for identifying and monitoring cyberthreats, but not for defending or recovering critical assets.

The post User Behavior Analytics: Perfect for Analysis but Not Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: Perfect for Analysis but Not Security

Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

A recent IBM X-Force report found that attacks against industrial control systems (ICS) increased significantly in 2016 over last year’s numbers.

The post Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent appeared first on Security Intelligence.

Continue reading Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

The Threat Model of 2017

If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.

The post The Threat Model of 2017 appeared first on Security Intelligence.

Continue reading The Threat Model of 2017

Football and Firewalls: A Winning Game Plan to Improve Network Security

Your network security playbook should include an intrusion prevention system (IPS) to detect and respond to threats your firewall misses.

The post Football and Firewalls: A Winning Game Plan to Improve Network Security appeared first on Security Intelligence.

Continue reading Football and Firewalls: A Winning Game Plan to Improve Network Security