What is cybersecurity mesh architecture (CSMA)?

Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a … Continue reading What is cybersecurity mesh architecture (CSMA)?

Campaigns and political parties are in the crosshairs of election meddlers

Attacks on elections have become more multifaceted over the past decade, but fears of a hacked election — real or perceived — remain one of the biggest threats.

The post Campaigns and political parties are in the crosshairs of election meddlers appeared first on CyberScoop.

Continue reading Campaigns and political parties are in the crosshairs of election meddlers

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success

Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand.
The post The Battle Continues: Mandian… Continue reading The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials. In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a […]

The post What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index? appeared first on Security Intelligence.

Continue reading What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement. 
The post In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Sec… Continue reading In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks.
The post Why Intelligence Sharing Is Vital to Building a Robust Col… Continue reading Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

How threat intelligence data maximizes business operations

Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizatio… Continue reading How threat intelligence data maximizes business operations

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries.
The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityW… Continue reading Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Outsmarting cybercriminal innovation with strategies for enterprise resilience

In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a confere… Continue reading Outsmarting cybercriminal innovation with strategies for enterprise resilience