Top 5 Threat Vectors in Connected Cars and How to Combat Them

Plug-in electric and at least partially autonomous connected cars are a common sight on roads around the world.  The software and electronic component market for those vehicles is projected to grow from $238 billion to $469 billion between 2020 and 2030. Both cybersecurity and ‘privacy by design and default’ have been holistically embedded into operations across many […]

The post Top 5 Threat Vectors in Connected Cars and How to Combat Them appeared first on Security Intelligence.

Continue reading Top 5 Threat Vectors in Connected Cars and How to Combat Them

Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based operations. It is possible to step away from only applying the traditional SIEM model with its […]

The post Why a Security Maturity Model Can Transform How You Use Analytics appeared first on Security Intelligence.

Continue reading Why a Security Maturity Model Can Transform How You Use Analytics

Data Breach Protection Must Include Physical Security

If most of your business’ data and workloads are handled on public clouds, it can be easy to forget about the onsite servers. With office buildings empty, employees may assume the servers are protected by the same physical security as the rest of the facility. However, physical security has its own considerations, and paying careful […]

The post Data Breach Protection Must Include Physical Security appeared first on Security Intelligence.

Continue reading Data Breach Protection Must Include Physical Security

Under Attack: How Threat Actors are Exploiting SOCKS Proxies

From the basic building blocks of the internet to cryptocurrency mining on a supercomputer, SOCKS sits at the core of computing. A SOCKS proxy can be used to improve network security in an enterprise, but can also be exploited by cybercriminals for nefarious reasons. Take a look at how SOCKS proxies have been manipulated recently […]

The post Under Attack: How Threat Actors are Exploiting SOCKS Proxies appeared first on Security Intelligence.

Continue reading Under Attack: How Threat Actors are Exploiting SOCKS Proxies

SOC 2.0: A Guide to Building a Strong Security Ops Team

In a security operations center (SOC), your cybersecurity tools are only as good as the people using them and your SOC’s culture. What are the critical SOC roles? What qualities should you look for when hiring for them? And, what should you expect from a cybersecurity career? Drawing from my experience working in IBM Security’s […]

The post SOC 2.0: A Guide to Building a Strong Security Ops Team appeared first on Security Intelligence.

Continue reading SOC 2.0: A Guide to Building a Strong Security Ops Team

Measuring Security Operations Center Effectiveness Globally

Do you know what is it like to measure and optimize global security operations centers (SOCs)? At IBM Managed Security Services’ (MSS), we measure an SOC a bit like operating and managing the performance of a factory. It’s incredibly important to monitor and measure the performance of every component and how they all work together. […]

The post Measuring Security Operations Center Effectiveness Globally appeared first on Security Intelligence.

Continue reading Measuring Security Operations Center Effectiveness Globally

Securing Data in a Multicloud Environment

The multicloud environment is becoming the standard for businesses, with 93% of organizations using this approach, according to a Flexera 2020 State of the Cloud report. The public cloud services used in the multicloud strategy are gaining in popularity, with Gartner predicting revenue in 2020 will reach more than $266 billion.  “Adoption of next-generation solutions […]

The post Securing Data in a Multicloud Environment appeared first on Security Intelligence.

Continue reading Securing Data in a Multicloud Environment

How Growing Businesses Should Tackle Cybersecurity Challenges

When we think about the most public cyber attacks and data breaches, we generally associate them with large enterprises. The truth is cyber attacks are not limited by company size. A significant cyber attack can happen to any company, in any industry and of any size. According to the 2019 Cost of a Data Breach […]

The post How Growing Businesses Should Tackle Cybersecurity Challenges appeared first on Security Intelligence.

Continue reading How Growing Businesses Should Tackle Cybersecurity Challenges

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began […]

The post Visibility and Threat Detection in a Remote Working World appeared first on Security Intelligence.

Continue reading Visibility and Threat Detection in a Remote Working World

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast, they […]

The post A Game of Chess: Entropy and Patterns in Threat Intelligence appeared first on Security Intelligence.

Continue reading A Game of Chess: Entropy and Patterns in Threat Intelligence