Industrial Control Systems Security: To Test or Not to Test?

According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?

The post Industrial Control Systems Security: To Test or Not to Test? appeared first on Security Intelligence.

Continue reading Industrial Control Systems Security: To Test or Not to Test?

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election

Enemy Unknown: Handling Customised Targeted Attacks

Detecting and preventing threats in real-time
Computer security products are designed to detect and protect against threats such as computer viruses, other malware and the actions of hackers.
A common approach is to identify existing threats and to cre… Continue reading Enemy Unknown: Handling Customised Targeted Attacks

Assessing next-generation protection

Malware scanning is not enough. You have to hack, too.
Latest report now online.
The amount of choice when trialling or buying endpoint security
is at an all-time high. It has been 36 years since ‘anti-virus’ first appeared
and, in the last five years,… Continue reading Assessing next-generation protection

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

Continue reading An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

Should you trust that Chrome extension? Use CRXcavator to decide

Duo Security has released CRXcavator, a tool that can help end users and enterprises make an informed decision about installing a specific Chrome extension. About CRXcavator CRXcavator was created as an internal tool by Duo’s Corporate Security Enginee… Continue reading Should you trust that Chrome extension? Use CRXcavator to decide

The System Development Life Cycle: A Phased Approach to Application Security

By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

Continue reading The System Development Life Cycle: A Phased Approach to Application Security

New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.

The post New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 appeared first on Security Intelligence.

Continue reading New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019