4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale […]

The post 4 Most Common Cyberattack Patterns from 2022 appeared first on Security Intelligence.

Continue reading 4 Most Common Cyberattack Patterns from 2022

White House rallies industry support for Internet of Things labeling effort

Executives from consumer electronic companies along with advocates and academics joined officials from the White House and FCC the meeting.

The post White House rallies industry support for Internet of Things labeling effort appeared first on CyberScoop.

Continue reading White House rallies industry support for Internet of Things labeling effort

White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star

The Biden administration hopes the voluntary effort helps inform consumers and compels manufacturers to improve internet of things security.

The post White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star appeared first on CyberScoop.

Continue reading White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star

What You Should Know About the Honda Key Fob Vulnerability

As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first time and saw all the different ways it linked to my phone or my home WiFi, more than a few red flags went up. I […]

The post What You Should Know About the Honda Key Fob Vulnerability appeared first on Security Intelligence.

Continue reading What You Should Know About the Honda Key Fob Vulnerability

Operational technology asset visibility fuels a capable cybersecurity program

New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.

The post Operational technology asset visibility fuels a capable cybersecurity program appeared first on CyberScoop.

Continue reading Operational technology asset visibility fuels a capable cybersecurity program

Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices.  These smart devices are the IoT in shadow IoT, and they could be maliciously or unintentionally exposing information. Threat actors can use that to access your systems and sensitive data, and wreak havoc upon your company. […]

The post Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface appeared first on Security Intelligence.

Continue reading Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

9 Factors to Consider Before Choosing a UEM Solution

The more of your employees who work remotely some or all of the time, the more devices they’re likely to use to conduct business. Employees use their own devices as well as corporate ones, making already-challenged cybersecurity systems more complex. In response, IT teams need to rethink their approach to endpoint management. Changes in endpoint […]

The post 9 Factors to Consider Before Choosing a UEM Solution appeared first on Security Intelligence.

Continue reading 9 Factors to Consider Before Choosing a UEM Solution

6 Ways SASE Helps Protect Your Data

You start to log in to work from the home office you’ve occupied for the last two years only to sit and wait patiently as your virtual private network (VPN) dials up. After a few minutes, it validates your credentials. You have access to log in and you peruse your emails over coffee.   One […]

The post 6 Ways SASE Helps Protect Your Data appeared first on Security Intelligence.

Continue reading 6 Ways SASE Helps Protect Your Data

Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business leaders in restructuring where and how people go about their jobs.  As much as workers like the hybrid workplace, it presents new challenges to security and IT teams. Management and security […]

The post Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World appeared first on Security Intelligence.

Continue reading Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say

The analysis shows that what was thought of as a straightforward DDoS tool was so much more.

The post FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say appeared first on CyberScoop.

Continue reading FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say