How Estonia Created Trust in Its Digital-Forward Government

Cities are becoming smarter every day, and many state and local governments are pushing towards the digitalization of public services. Some North American cities are working hard to integrate online services and manage cybersecurity risk at the same time. Meanwhile, perhaps the best example of a digital city is in fact a digital country.  The […]

The post How Estonia Created Trust in Its Digital-Forward Government appeared first on Security Intelligence.

Continue reading How Estonia Created Trust in Its Digital-Forward Government

Ransomware preparedness is low despite executives’ concerns

86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll. And while 64.8% of polled executives say that ransomware is a cyber… Continue reading Ransomware preparedness is low despite executives’ concerns

Why your threat hunting program building shouldn’t stop once the engagement is over

Let’s see, it looks like your organization just met an annual Threat Hunting assessment compliance requirement or achieved the introductory objective of experiencing a formal Threat Hunting assessment. Well done! Now, what should the organization take into consideration after successfully completing the assessment? Once a third-party Threat Hunting assessment concludes, many organizations may feel overwhelmed…

The post Why your threat hunting program building shouldn’t stop once the engagement is over appeared first on TrustedSec.

Continue reading Why your threat hunting program building shouldn’t stop once the engagement is over

10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

Finding the Open Source Intelligence (OSINT) that affects your business or agency can help reduce your attack surface. You just have to find it first. Take a look at how OSINT works and how to secure it. According to the Office of the Director of National Intelligence, Open Source Intelligence (OSINT) “is publicly available information […]

The post 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software) appeared first on Security Intelligence.

Continue reading 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Organizational resilience is key to good business. Sometimes confused with enterprise resilience, we use the former term instead because it applies to a business or agency of any size. Let’s take a look at how to improve employees’ cybersecurity posture by providing practical ideas they can add to their everyday habits. The result: cyber resilience […]

The post A Journey in Organizational Cyber Resilience Part 1: The Human Factor appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 1: The Human Factor

What’s Behind the Leaks of Customer Data From Retailer Databases?

Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less. Yet, they happen more often than realized. Why? And how can you defend against them?  Human Error in Customer Data Theft All types of retail […]

The post What’s Behind the Leaks of Customer Data From Retailer Databases? appeared first on Security Intelligence.

Continue reading What’s Behind the Leaks of Customer Data From Retailer Databases?

Private 5G Security: Consider Security Risks Before Investing

So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]

The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.

Continue reading Private 5G Security: Consider Security Risks Before Investing

How Companies Can Prepare for Botnet Attacks on APIs

Organizations aren’t slowing down in their use of application programming interfaces (APIs). According to a survey covered by DEVOPSdigest, 61.3% of organizations used more APIs in 2020 than they did a year earlier. An even greater proportion (71.3%) said they plan to use even more APIs in 2021. Another 21.2% expected to use the same […]

The post How Companies Can Prepare for Botnet Attacks on APIs appeared first on Security Intelligence.

Continue reading How Companies Can Prepare for Botnet Attacks on APIs

LockBit 2.0: Ransomware Attacks Surge After Successful Affiliate Recruitment

After a brief slowdown in activity from the LockBit ransomware gang following increased attention from law enforcement, LockBit is back with a new affiliate program, improved payloads and a change in infrastructure. According to IBM X-Force, a major spike in data leak activity on the gang’s new website indicates that their recruitment attempts have been […]

The post LockBit 2.0: Ransomware Attacks Surge After Successful Affiliate Recruitment appeared first on Security Intelligence.

Continue reading LockBit 2.0: Ransomware Attacks Surge After Successful Affiliate Recruitment

Fighting Cyber Threats With Open-Source Tools and Open Standards

Detecting cyber threats is usually the first critical step in the mitigation of cyber attacks. Common means to achieve this goal are rules or analytics that track network and system behaviors and raise alerts when potentially malicious attacks are identified. Once a potential threat is detected, the staff of the security operations center (SOC) investigates […]

The post Fighting Cyber Threats With Open-Source Tools and Open Standards appeared first on Security Intelligence.

Continue reading Fighting Cyber Threats With Open-Source Tools and Open Standards