Identity Is the New Perimeter — But Where’s Its Firewall?

Network and endpoint access procedures have progressed to the point that now identity is the new perimeter of cybersecurity. Improving methods of multifactor authentication is crucial to building trust.

The post Identity Is the New Perimeter — But Where’s Its Firewall? appeared first on Security Intelligence.

Continue reading Identity Is the New Perimeter — But Where’s Its Firewall?

How to Outsmart the Smart City

Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating “supervillain-level” attacks. Here’s what the teams found.

The post How to Outsmart the Smart City appeared first on Security Intelligence.

Continue reading How to Outsmart the Smart City

Become a JSON Formatter — and Kick Your Security Integrations Into Action

Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.

The post Become a JSON Formatter — and Kick Your Security Integrations Into Action appeared first on Security Intelligence.

Continue reading Become a JSON Formatter — and Kick Your Security Integrations Into Action

DeepLocker: How AI Can Power a Stealthy New Breed of Malware

DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here’s what you need to know.

The post DeepLocker: How AI Can Power a Stealthy New Breed of Malware appeared first on Security Intelligence.

Continue reading DeepLocker: How AI Can Power a Stealthy New Breed of Malware

AI & ML IN CYBERSECURITY – Why Algorithms Are Dangerous

Join me for my talk about AI and ML in cyber security at BlackHat on Thursday the 9th of August in Las Vegas. I’ll be exploring the topics of artificial intelligence (AI) and machine learning (ML) to show some of the ‘dangerous’ mista… Continue reading AI & ML IN CYBERSECURITY – Why Algorithms Are Dangerous

Attack inception: Compromised supply chain within a supply chain poses new risks

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF edito… Continue reading Attack inception: Compromised supply chain within a supply chain poses new risks

How Open Source Intelligence Could Save Your Network

Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.

The post How Open Source Intelligence Could Save Your Network appeared first on Security Intelligence.

Continue reading How Open Source Intelligence Could Save Your Network

Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Today’s security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.

The post Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help appeared first on Security Intelligence.

Continue reading Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don’t know how to get the most out of their security information and event management (SIEM) solution.

The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation appeared first on Security Intelligence.

Continue reading Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

The post How Can We Make Smart Cities Even Smarter? Start With Security Intelligence appeared first on Security Intelligence.

Continue reading How Can We Make Smart Cities Even Smarter? Start With Security Intelligence