Package Delivery! Cybercriminals at Your Doorstep

Reading Time: 6 minutes IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or from someone’s front door.

The post Package Delivery! Cybercriminals at Your Doorstep appeared first on Security Intelligence.

Continue reading Package Delivery! Cybercriminals at Your Doorstep

Top Five Security Focus Areas for Mainframes

Reading Time: 5 minutes Given trends like data center consolidation, hybrid cloud models and new designs that allow mainframes to operate in traditional environments, what better time to reevaluate your mainframe security?

The post Top Five Security Focus Areas for Mainframes appeared first on Security Intelligence.

Continue reading Top Five Security Focus Areas for Mainframes

4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Reading Time: 4 minutes It’s not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact.

The post 4 Questions CISOs Need to Ask About Enterprise Cybersecurity appeared first on Security Intelligence.

Continue reading 4 Questions CISOs Need to Ask About Enterprise Cybersecurity

From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals.

The post From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise appeared first on Security Intelligence.

Continue reading From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

The Path to Passwordless Authentication Is Shorter Than We Thought

The latest Enterprise Management Associates (EMA) data revealed that passwords are problematic. If that’s the case, why are organizations so slow to adopt passwordless authentication?

The post The Path to Passwordless Authentication Is Shorter Than We Thought appeared first on Security Intelligence.

Continue reading The Path to Passwordless Authentication Is Shorter Than We Thought

The Expiration Date on Passwords Has Expired

Changing your passwords frequently sounds like commonsense advice. However, just because something is common doesn’t mean it makes sense.

The post The Expiration Date on Passwords Has Expired appeared first on Security Intelligence.

Continue reading The Expiration Date on Passwords Has Expired

The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art.

The post The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication appeared first on Security Intelligence.

Continue reading The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

Why Cybercriminals Are Targeting Travel and Transportation

Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.

The post Why Cybercriminals Are Targeting Travel and Transportation appeared first on Security Intelligence.

Continue reading Why Cybercriminals Are Targeting Travel and Transportation

Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both

Now that we have tools that provide multifactor authentication (MFA) without friction, it’s time to upgrade your mainframe security to participate more fully in the benefits of digital transformation.

The post Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both appeared first on Security Intelligence.

Continue reading Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both

Is Your Company Culture Seamlessly Secure — or Just Stressful?

As security practitioners, we probably have a good grasp of technological controls. But adversarial company culture may be creating stress that keeps people from protecting our data.

The post Is Your Company Culture Seamlessly Secure — or Just Stressful? appeared first on Security Intelligence.

Continue reading Is Your Company Culture Seamlessly Secure — or Just Stressful?