How AI Will Transform Data Security

I’ve often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security. Yes, I love the convenience of online stores suggesting the perfect items for me based on my search history, but other times it feels a bit creepy to have a pair of shoes I looked […]

The post How AI Will Transform Data Security appeared first on Security Intelligence.

Continue reading How AI Will Transform Data Security

Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about the prospect of a third-party data breach. Sitter is the senior director of information security at Juniper Networks. He manages all things incident response-related — […]

The post Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach appeared first on Security Intelligence.

Continue reading Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

Cookie Hijacking: More Dangerous Than it Sounds

Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack surface widening with more apps, devices and systems connecting than ever before, threat actors are working overtime to beat MFA. Cookie hijacking in particular is a […]

The post Cookie Hijacking: More Dangerous Than it Sounds appeared first on Security Intelligence.

Continue reading Cookie Hijacking: More Dangerous Than it Sounds

Why Every Company Needs a Software Update Schedule

Software without the most recent patch is like an unlocked door for threat actors. They know the openings are there and can just walk in. But patching and a software update schedule can make sure that door stays locked.  Applying patches isn’t difficult. Click a few buttons, reboot and you are good to go. Even […]

The post Why Every Company Needs a Software Update Schedule appeared first on Security Intelligence.

Continue reading Why Every Company Needs a Software Update Schedule

IBM Works With Cisco to Exorcise Ghosts From Webex Meetings

COVID-19 has changed the way many people work, as organizations have shifted to remote work to slow the spread. In early May, more than 100 million Americans were working from home, creating an increased need for remote collaboration tools like video conferencing. The use of Webex grew 451% between Feb. 17 and June 14 2020. […]

The post IBM Works With Cisco to Exorcise Ghosts From Webex Meetings appeared first on Security Intelligence.

Continue reading IBM Works With Cisco to Exorcise Ghosts From Webex Meetings

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority.  Keeping legacy systems up to date in a world of increasing cyber threats has been a concern the past few years, but […]

The post Updating Legacy Systems Amid Growing Cybersecurity Concerns appeared first on Security Intelligence.

Continue reading Updating Legacy Systems Amid Growing Cybersecurity Concerns

Critical Cisco Bug Opens Software Licencing Manager to Remote Attack

A default password would let anyone access the Cisco Smart Software Manager On-Prem Base platform, even if it’s not directly connected to the internet. Continue reading Critical Cisco Bug Opens Software Licencing Manager to Remote Attack

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

Ditching monolith for microservices may be right for your organization, but it’s critical to address the relevant security considerations early in the process.

The post Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security appeared first on Security Intelligence.

Continue reading Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security