Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Continue reading Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

Reading Time: 5 minutes According to a recent study from Palo Alto Networks and YouGov, some of us have more trust in cybersecurity AI than we do humans when it comes to managing security.

The post What Would You Trust to Protect Your Business: Humans or Cybersecurity AI? appeared first on Security Intelligence.

Continue reading What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

Due to its interconnected nature, the financial services industry needs to prepare to respond to a systemic cyberattack that could impact its overarching infrastructure across borders.

The post How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack? appeared first on Security Intelligence.

Continue reading How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

Why Continuous, Long-Term Security Awareness Training Will Build Tomorrow’s Cybersecurity Champions

Back in 2003, a Swiss tennis player named Roger Federer won his first grand slam title – the prestigious Wimbledon championship. Federer has since won more than 100 ATP titles, making him one of the most accomplished tennis players in history &#8… Continue reading Why Continuous, Long-Term Security Awareness Training Will Build Tomorrow’s Cybersecurity Champions

How to teach developers secure coding without slowing them down

Secure coding training isn’t required in most computer science programs. How can you fill the gaps in your developers’ education without slowing them down?
The post How to teach developers secure coding without slowing them down appeared f… Continue reading How to teach developers secure coding without slowing them down

Why Security Incidents Often Go Underreported

If you saw a coworker browsing through a database they weren’t supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.

The post Why Security Incidents Often Go Underreported appeared first on Security Intelligence.

Continue reading Why Security Incidents Often Go Underreported

The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens

While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems?

The post The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens appeared first on Security Intelligence.

Continue reading The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens

The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is intended to boost cybersecurity skills and improve national defense against growing cyberthreats. Will it work?
The post The cybersecurity workforce executive order: Real potential or wishful thinking? appe… Continue reading The cybersecurity workforce executive order: Real potential or wishful thinking?

Interns and Social Media: A Goldmine for Hackers

A social media post from one of a company’s interns was all this people hacker needed to enter a secure area with a counterfeit employee badge. Learn tips for welcoming new employees securely.

The post Interns and Social Media: A Goldmine for Hackers appeared first on Security Intelligence.

Continue reading Interns and Social Media: A Goldmine for Hackers