Critical Infrastructure Attack Trends: What Business Leaders Should Know

Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. […]

The post Critical Infrastructure Attack Trends: What Business Leaders Should Know appeared first on Security Intelligence.

Continue reading Critical Infrastructure Attack Trends: What Business Leaders Should Know

Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Imagine being able to manage hundreds of millions of IDs and process billions of logins and other transactions per day. That’s what you can achieve for your organization by using consumer identity and access management, or CIAM. At the same time, your users can manage their data themselves by having a CIAM system ready to […]

The post Learning the Building Blocks for Your CIAM Framework Part 3: Manage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Try These Best Practices to Counter Common Cybersecurity Risks

Since the beginning of the pandemic, ransomware and other cyber attacks have spiked. Meanwhile, millions of people have shifted from working in offices to working remotely. Organizations are increasingly relying on video conferencing, virtual private networks (VPNs) and remote desktop protocol admin tools. Many employers believe that, to cut down on these risks, they should […]

The post Try These Best Practices to Counter Common Cybersecurity Risks appeared first on Security Intelligence.

Continue reading Try These Best Practices to Counter Common Cybersecurity Risks

Try These Best Practices to Counter Common Cybersecurity Risks

Since the beginning of the pandemic, ransomware and other cyber attacks have spiked. Meanwhile, millions of people have shifted from working in offices to working remotely. Organizations are increasingly relying on video conferencing, virtual private networks (VPNs) and remote desktop protocol admin tools. Many employers believe that, to cut down on these risks, they should […]

The post Try These Best Practices to Counter Common Cybersecurity Risks appeared first on Security Intelligence.

Continue reading Try These Best Practices to Counter Common Cybersecurity Risks

User Behavior Analytics: What It Is and How It Advances Digital Security

Organizations are struggling to pinpoint threats that come from real user accounts. Take insider threats, as an example. In a 2020 report, 68% of IT and security experts felt their employers were somewhat or very at risk to insider attacks. Over half (53%) said it had become at least somewhat harder to detect an insider attack […]

The post User Behavior Analytics: What It Is and How It Advances Digital Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: What It Is and How It Advances Digital Security

Why Automation and Zero Trust Go Hand-in-Hand

Zero trust can reshape how businesses approach digital security. The idea is to distrust by default, regardless of whether the information is located inside or outside the corporate network. From there, security teams can verify devices, apps and connections on a case-by-case basis. They should also re-verify the trust of those network assets on an […]

The post Why Automation and Zero Trust Go Hand-in-Hand appeared first on Security Intelligence.

Continue reading Why Automation and Zero Trust Go Hand-in-Hand

Zero Trust and Insider Threats: Was Brutus the Original Bad Actor?

Insider threats have been a problem for as long as there have been insiders. What’s changed over time? Well, for one, Brutus and his conspirators didn’t exactly leave a trail of logs and flows when they plotted against Julius Caesar and the Roman Republic. Fast forward 2,000 years, and there’s a good news/bad news update […]

The post Zero Trust and Insider Threats: Was Brutus the Original Bad Actor? appeared first on Security Intelligence.

Continue reading Zero Trust and Insider Threats: Was Brutus the Original Bad Actor?

Zero Trust: Confidently Secure Your Business to Grow Fearlessly

What would your business be able to do if security risks were no longer a concern?  What sort of products would you build for your customers? What types of experiences could you enable for your employees to be more effective? What would you change to power your business forward? As the general manager for IBM […]

The post Zero Trust: Confidently Secure Your Business to Grow Fearlessly appeared first on Security Intelligence.

Continue reading Zero Trust: Confidently Secure Your Business to Grow Fearlessly

Don’t Make Headlines Over an Insider Incident: Lessons From the Frontlines

On the path to becoming more cyber secure, organizations across the globe spend an estimated $60 billion per year to defend their assets, recruit talent and work to prevent and respond to cyberattacks. Moreover, security spending is expected to rise another 10% in 2021. But while much of an organization’s security focus and spending is […]

The post Don’t Make Headlines Over an Insider Incident: Lessons From the Frontlines appeared first on Security Intelligence.

Continue reading Don’t Make Headlines Over an Insider Incident: Lessons From the Frontlines

The Story of FakeChat

Starting late December 2020, IBM Trusteer’s mobile threat research lab discovered and began closely tracking a new Android banking malware that appeared to be mostly targeting users in Spain. Per our analysis, the purpose of the malware is to steal credit card numbers, bank account credentials and other private information from its victims. Once a […]

The post The Story of FakeChat appeared first on Security Intelligence.

Continue reading The Story of FakeChat