It’s Time to Take a Fresh Look at Zero Trust

A convergence of trends and technologies is making Zero Trust an increasingly necessary cybersecurity strategy.

The post It’s Time to Take a Fresh Look at Zero Trust appeared first on Security Intelligence.

Continue reading It’s Time to Take a Fresh Look at Zero Trust

What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

IBM X-Force Research has been seeing a significant number of new malicious domains related to COVID-19 appear in the wild since late February 2020, based on Quad 9 data.

The post What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic appeared first on Security Intelligence.

Continue reading What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

Promote security awareness among your remote workforce and inform future training efforts by distributing tailored cybersecurity self-assessments to your employees.

The post Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce appeared first on Security Intelligence.

Continue reading Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Since March 11, IBM X-Force has observed a more than 6,000 percent increase in COVID-19 spam, with lures ranging the full gamut of challenges and concerns facing individuals.

The post New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam appeared first on Security Intelligence.

Continue reading New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

How CIAM Addresses the Challenges of Consumer Identity Management

A consumer identity and access management (CIAM) solution can help enable secure, personalized, omnichannel interactions between consumers and brands.

The post How CIAM Addresses the Challenges of Consumer Identity Management appeared first on Security Intelligence.

Continue reading How CIAM Addresses the Challenges of Consumer Identity Management

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.

The post Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers appeared first on Security Intelligence.

Continue reading Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.

The post New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East appeared first on Security Intelligence.

Continue reading New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game?

The current state of mainframe security often amounts to bringing a knife to a gun fight: The number of available fighters is shrinking as skilled mainframe security practitioners hang up their hats.

The post Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game? appeared first on Security Intelligence.

Continue reading Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game?

How to Explain Cybersecurity and Improve User Behavior at the Same Time

Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.

The post How to Explain Cybersecurity and Improve User Behavior at the Same Time appeared first on Security Intelligence.

Continue reading How to Explain Cybersecurity and Improve User Behavior at the Same Time