Don’t Remove Stalkerware Before Reading This Article

Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else can install on your device to intercept text messages and phone calls, send call logs, record web browsing activity and keystrokes and even access your location. […]

The post Don’t Remove Stalkerware Before Reading This Article appeared first on Security Intelligence.

Continue reading Don’t Remove Stalkerware Before Reading This Article

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails and infecting […]

The post Why Zero-Click Cyberthreats Should Be on Your Radar appeared first on Security Intelligence.

Continue reading Why Zero-Click Cyberthreats Should Be on Your Radar

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already spend time on the job, while physically separated from the corporate campus. Sometimes they will […]

The post The Modern Workplace: Keeping Remote Workers Productive and Secure appeared first on Security Intelligence.

Continue reading The Modern Workplace: Keeping Remote Workers Productive and Secure

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been available since the 1990s, and it has served us well. Now, Rich Communication Services is here. What kinds of security vulnerabilities are associated with this new tech?

The post What Is Rich Communication Services? Breaking Down the Benefits and Security Risks appeared first on Security Intelligence.

Continue reading What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Artificial Intelligence (AI) and Security: A Match Made in the SOC

When security analysts partner with artificial intelligence, the benefits include increased productivity, improved job satisfaction, and streamlined threat detection, investigation and response.

The post Artificial Intelligence (AI) and Security: A Match Made in the SOC appeared first on Security Intelligence.

Continue reading Artificial Intelligence (AI) and Security: A Match Made in the SOC

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Is Juice Jacking a Legitimate Threat or Nothing to Worry About?

Juice jacking is either a rare or currently unpracticed attack that’s brimming with potential for cybercriminals and spies.

The post Is Juice Jacking a Legitimate Threat or Nothing to Worry About? appeared first on Security Intelligence.

Continue reading Is Juice Jacking a Legitimate Threat or Nothing to Worry About?

How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

Unified policy management that is integrated both horizontally and vertically can enable better flexibility, productivity and security benefits.

The post How Unified Policy Management Can Enable Business Flexibility, Productivity and Security appeared first on Security Intelligence.

Continue reading How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution

The goal of a strong unified endpoint management (UEM) platform is unifying and modernizing management, enhancing security and providing a positive end-user experience.

The post The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution appeared first on Security Intelligence.

Continue reading The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Consumers don’t vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ Continue reading ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones