Will Australia Ever Dig Itself Out of the Cybersecurity Skills Shortage?

Australia is grappling with this cyber security challenge that is resulting in frequent breaches across large companies. Here are possible solutions, including how cyber security pros can help. Continue reading Will Australia Ever Dig Itself Out of the Cybersecurity Skills Shortage?

Securing Your Remote Workforce: How to Reduce Cyber Threats

The debates have (mostly) stopped about whether remote work is here to stay. For many people, it’s just the way we work today. However, even three years later, cybersecurity around remote work is still a top concern. Both companies and employees have room for improvement in terms of protecting devices, data and apps from cybersecurity […]

The post Securing Your Remote Workforce: How to Reduce Cyber Threats appeared first on Security Intelligence.

Continue reading Securing Your Remote Workforce: How to Reduce Cyber Threats

Securing Your Supply Chain Through Cyber Risk Management

Supply chain risk is now recognized as a top challenge, with more than half of security breaches attributed to supply chain and third-party suppliers. This can be a costly vulnerability. The global average data breach cost was $4.35 million last year, according to IBM’s Cost of a Data Breach 2022 report. These risks stem from […]

The post Securing Your Supply Chain Through Cyber Risk Management appeared first on Security Intelligence.

Continue reading Securing Your Supply Chain Through Cyber Risk Management

How Breached Companies Become the Face of Change

I’ve always told my kids that everyone makes mistakes. What really matters is how you handle them and that you learn from what happened.  SolarWinds followed the same thinking in how it handled its 2020 breach. Not only did the company write its comeback story to help improve its reputation, but it is also working […]

The post How Breached Companies Become the Face of Change appeared first on Security Intelligence.

Continue reading How Breached Companies Become the Face of Change

What is the Future of Password Managers?

In November 2022, LastPass had its second security breach in four months. Although company CEO Karim Toubba assured customers they had nothing to worry about, the incident didn’t inspire confidence in the world’s leading password manager application. Password managers have one vital job: keep your sensitive login credentials secret, so your accounts remain secure. When hackers […]

The post What is the Future of Password Managers? appeared first on Security Intelligence.

Continue reading What is the Future of Password Managers?

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe.  […]

The post Why Are Cloud Misconfigurations Still a Major Issue? appeared first on Security Intelligence.

Continue reading Why Are Cloud Misconfigurations Still a Major Issue?

What Kind of Data Costs Most in a Breach?

Today’s most valuable currency is data. Breaches, information operations, analytics and behavior recognition are all driven by data and the desire to possess it, regardless of what those who possess it want to do with it. We set out to answer the question “What kind of data costs the most in a breach?” As it […]

The post What Kind of Data Costs Most in a Breach? appeared first on Security Intelligence.

Continue reading What Kind of Data Costs Most in a Breach?

Security Obscurity Versus Ethical Hackers: Who’s Right?

Security breaches can lead to damage to a business’s finances, operations and reputation. What many companies might fear most is the latter: damage to their reputation. This may explain why 65% of organizations want to be seen as infallible, as per a recent HackerOne survey. Meanwhile, 64% maintain a culture of security through obscurity, and […]

The post Security Obscurity Versus Ethical Hackers: Who’s Right? appeared first on Security Intelligence.

Continue reading Security Obscurity Versus Ethical Hackers: Who’s Right?

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments.
Dubbed DCShadow, this is a late-stage kill chain attack that …
The post I… Continue reading IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

A SonicWall cloud bug exposed corporate networks to hackers

A newly discovered bug in a cloud system used to manage SonicWall firewalls could have allowed hackers to break into thousands of corporate networks. Enterprise firewalls and virtual private network appliances are vital gatekeepers tasked with protecting corporate networks from hackers and cyberattacks while still letting in employees working from home during the pandemic. Even […] Continue reading A SonicWall cloud bug exposed corporate networks to hackers