Making the Leap: The Risks and Benefits of Passwordless Authentication

The password isn’t going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future.  But for some businesses and agencies, going passwordless is the clear strategy. Microsoft, for instance, […]

The post Making the Leap: The Risks and Benefits of Passwordless Authentication appeared first on Security Intelligence.

Continue reading Making the Leap: The Risks and Benefits of Passwordless Authentication

The State of Credential Stuffing Attacks

Credential stuffing has become a preferred tactic among digital attackers over the past few years. As reported by Help Net Security, researchers detected 193 billion credential stuffing attacks globally in 2020. Financial services groups suffered 3.4 billion of those attacks. That’s an increase of more than 45% year over year in that sector. In H1 […]

The post The State of Credential Stuffing Attacks appeared first on Security Intelligence.

Continue reading The State of Credential Stuffing Attacks

Nobelium Espionage Campaign Persists, Service Providers in Crosshairs

In an advisory released on October 24, Microsoft announced ongoing campaigns it has attributed to the Nobelium state-sponsored threat group. IBM X-Force tracks this group as Hive099. If the name sounds familiar, that’s because it is the same group that targeted SolarWinds in 2020. The U.S. government has identified Nobelium as part of Russia’s foreign […]

The post Nobelium Espionage Campaign Persists, Service Providers in Crosshairs appeared first on Security Intelligence.

Continue reading Nobelium Espionage Campaign Persists, Service Providers in Crosshairs

Zero Trust: Follow a Model, Not a Tool

The zero trust model is going mainstream, and for good reason. The rise in advanced attacks, plus IT trends that include the move to hybrid cloud and remote work, demand more exacting and granular defenses.  Zero trust ensures verification and authorization for every device, every application and every user gaining access to every resource. This […]

The post Zero Trust: Follow a Model, Not a Tool appeared first on Security Intelligence.

Continue reading Zero Trust: Follow a Model, Not a Tool

How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging […]

The post How to Fix the Big Problems With Two-Factor and Multifactor Authentication appeared first on Security Intelligence.

Continue reading How to Fix the Big Problems With Two-Factor and Multifactor Authentication

3 Myths About Threat Actors and Password Safety

You’ve seen the memes and the warnings on social media — answering questions about your life history is ruining your password safety. It’s giving the bad guys the information they need to figure out your passwords and get the answers to your security questions.  But is that true? Are people lurking on social media waiting […]

The post 3 Myths About Threat Actors and Password Safety appeared first on Security Intelligence.

Continue reading 3 Myths About Threat Actors and Password Safety

Why a Phishing Attack Is Still Profitable — And How To Stop One

As the business world continues to grapple with an expanding definition of new normal, the phishing attack remains a common tactic for attackers. Why are phishing attacks still happening? How can we prevent them? We spoke to a threat analyst who has the answers. In May 2020, X-Force research uncovered a precision-targeting (or spear phishing) […]

The post Why a Phishing Attack Is Still Profitable — And How To Stop One appeared first on Security Intelligence.

Continue reading Why a Phishing Attack Is Still Profitable — And How To Stop One

How Good Transaction Security Can Make Customer Visits Easier

Every time I start to put my information into an online form, especially if it’s my credit card number or a banking transaction, I almost always pause. There was a time when I entered customer data without a second thought. Now, with the constant news of breaches and attacks, even those not in the cybersecurity […]

The post How Good Transaction Security Can Make Customer Visits Easier appeared first on Security Intelligence.

Continue reading How Good Transaction Security Can Make Customer Visits Easier

Securing Your Cloud Transformation Journey

Cloud computing introduced a paradigm shift in how companies operated, maintained and spent on IT. Through its varied service models (IaaS, PaaS and SaaS), it offers companies the ability to spin up their infrastructure in minutes, auto scale on demand, pay only as per use and offset significant IT costs spent on running and maintaining […]

The post Securing Your Cloud Transformation Journey appeared first on Security Intelligence.

Continue reading Securing Your Cloud Transformation Journey

Accelerate Your Hybrid Cloud Journey With Security Confidence

Organizations are accelerating their move to cloud to drive business innovation and customer success. In fact, 74% of respondents to a 2020 LogicMonitor survey believe that 95% of workloads will migrate to cloud in the next five years. At the same time, cloud poses new cybersecurity challenges as teams struggle to keep pace with the […]

The post Accelerate Your Hybrid Cloud Journey With Security Confidence appeared first on Security Intelligence.

Continue reading Accelerate Your Hybrid Cloud Journey With Security Confidence