The Past, Present and Future of Security Information and Event Management (SIEM)

Security information and event management (SIEM) was originally designed to help organizations achieve and maintain compliance, but over the years, it’s evolved to become so much more.

The post The Past, Present and Future of Security Information and Event Management (SIEM) appeared first on Security Intelligence.

Continue reading The Past, Present and Future of Security Information and Event Management (SIEM)

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What kinds of state and local government institutions are being targeted by cybercriminals? And what can we learn from recent municipal cyberattacks?

The post Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks? appeared first on Security Intelligence.

Continue reading Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The IBM X-Force Threat Intelligence Index 2020 found that industrial control systems became a popular target for specialized actors in 2019. Find out what this means for the future of cybersecurity.

The post What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders appeared first on Security Intelligence.

Continue reading What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government have increased dramatically over the last several years. What is it about municipal organizations and governments that makes them such attractive targets?

The post Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government appeared first on Security Intelligence.

Continue reading Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

In-store Payments via Mobile Apps Can Lead to Increase in Card Not Present (CNP) Fraud

Consumers love the convenience of paying for goods and services in store by using their NFC enabled smartphones and stored credit cards. This is demonstrated by the fact that you can download retailer specific apps for your smartphone to pay for everyt… Continue reading In-store Payments via Mobile Apps Can Lead to Increase in Card Not Present (CNP) Fraud

9 Reasons Why Cybersecurity Stress Is an Industry Epidemic

Learn why a security career may carry above-average risks of occupational stress, and how CISOs should respond before cybersecurity stress threatens employee well-being or enterprise security risks.

The post 9 Reasons Why Cybersecurity Stress Is an Industry Epidemic appeared first on Security Intelligence.

Continue reading 9 Reasons Why Cybersecurity Stress Is an Industry Epidemic

Looking Back on a Year of (Unexpected) Security Keynote Speeches

As wide-ranging as the security keynote speeches I heard last year were, almost all had a similar message: We’re overwhelmed by threats that, if left unanswered, could take down our institutions.

The post Looking Back on a Year of (Unexpected) Security Keynote Speeches appeared first on Security Intelligence.

Continue reading Looking Back on a Year of (Unexpected) Security Keynote Speeches

Looking Ahead to 2020 Cybersecurity Trends and a New Decade

As we look ahead to 2020 cybersecurity trends and beyond, it’s crucial to shed light on some things that may keep us up at night and discuss how to prepare for what’s in store.

The post Looking Ahead to 2020 Cybersecurity Trends and a New Decade appeared first on Security Intelligence.

Continue reading Looking Ahead to 2020 Cybersecurity Trends and a New Decade

The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019

Four trends defined data breaches in 2019: million-record breaches, pinpoint ransomware attacks, data left exposed on cloud servers and the struggle of cryptocurrencies to go mainstream.

The post The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019 appeared first on Security Intelligence.

Continue reading The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019