7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate their next move. When you understand an attacker’s perspec… Continue reading 7 Key Features of a Breach and Attack System

3 Lessons From the Incident Response Tabletops

Here are three lessons I’ve learned about incident response from having run tabletop exercises within IBM and alongside our clients.

The post 3 Lessons From the Incident Response Tabletops appeared first on Security Intelligence.

Continue reading 3 Lessons From the Incident Response Tabletops

Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020

2020 is here. Toss any bad habits and take on new goals this year by identifying critical outcomes, defining key metrics and implementing your security New Year’s resolutions step-by-step.

The post Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020 appeared first on Security Intelligence.

Continue reading Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020

Testing deeper, wider and better

Bad guys evolve; defenders evolve; testing (should) evolve
Latest endpoint protection reports now online for enterprise, small business and home users.
These reports represent the state-of-the-art in computer security endpoint testing. If you want to s… Continue reading Testing deeper, wider and better

The rise of continuous crowdsourced security testing for compliance

A large percentage of organizations and institutions are moving toward a rigorous, continuous testing model to ensure compliance, a Synack report reveals. As part of this shift toward continuous testing, organizations are utilizing crowdsourced securit… Continue reading The rise of continuous crowdsourced security testing for compliance

New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.

The post New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East appeared first on Security Intelligence.

Continue reading New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

CrackQ: Efficient password cracking for pentesters and red teamers

CrackQ employs automation to make password cracking a faster and more efficient undertaking for pentesters and red teamers. CrackQ dashboard “Regular security testing is a practice all organizations should incorporate into their overall security … Continue reading CrackQ: Efficient password cracking for pentesters and red teamers

Improve Your Detection Capabilities With Cyber Simulation Datasets

Every organization must develop methods of testing and improving existing detection capabilities, from on-paper assessments to a full-blown cyber simulation.

The post Improve Your Detection Capabilities With Cyber Simulation Datasets appeared first on Security Intelligence.

Continue reading Improve Your Detection Capabilities With Cyber Simulation Datasets

Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

Many manufacturers of connected devices fail to recognize the IoT security implications of customers tinkering with their products.

The post Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security appeared first on Security Intelligence.

Continue reading Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

Breach Response Test: Kaspersky Anti Targeted Attack Platform

Testing anti-breach products needs the full chain of attack.
Kaspersky Lab should be congratulated, not only for engaging with this new and challenging test, but for submitting a product that performed so strongly against attacks that closely replicate… Continue reading Breach Response Test: Kaspersky Anti Targeted Attack Platform