What does resilience in the cyber world look like in 2025 and beyond?

  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term “resilience” can be difficult to define, and when we define it, we […]

The post What does resilience in the cyber world look like in 2025 and beyond? appeared first on Security Intelligence.

Continue reading What does resilience in the cyber world look like in 2025 and beyond?

Airplane cybersecurity: Past, present, future

With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted. To improve security […]

The post Airplane cybersecurity: Past, present, future appeared first on Security Intelligence.

Continue reading Airplane cybersecurity: Past, present, future

Protecting your digital assets from non-human identity attacks

Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps. The use of non-human identities (NHIs) to power business-critical applications — […]

The post Protecting your digital assets from non-human identity attacks appeared first on Security Intelligence.

Continue reading Protecting your digital assets from non-human identity attacks

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data […]

The post Cybersecurity dominates concerns among the C-suite, small businesses and the nation appeared first on Security Intelligence.

Continue reading Cybersecurity dominates concerns among the C-suite, small businesses and the nation

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities.” These actors pose a critical threat to United States infrastructure and protected data, and […]

The post Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity appeared first on Security Intelligence.

Continue reading Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern. On October 2, 2024, the NSA (National Security Agency) released a new […]

The post 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative appeared first on Security Intelligence.

Continue reading 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust str… Continue reading Evaluating your organization’s application risk management journey

Setting a security standard: From vulnerability to exposure management

Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average data breach co… Continue reading Setting a security standard: From vulnerability to exposure management

What Telegram’s recent policy shift means for cyber crime

Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the user’s real […]

The post What Telegram’s recent policy shift means for cyber crime appeared first on Security Intelligence.

Continue reading What Telegram’s recent policy shift means for cyber crime