How Deepfakes Will Make Us Question Everything in 2020

If anyone can claim that what they said was the result of a deepfake, how can we distinguish the truth anymore?

The post How Deepfakes Will Make Us Question Everything in 2020 appeared first on Security Intelligence.

Continue reading How Deepfakes Will Make Us Question Everything in 2020

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on security, but threat vectors continue to evolve. Unified threat management tools offer a way to bridge the gap.

The post What Is Unified Threat Management? A Pragmatic Approach to Information Security appeared first on Security Intelligence.

Continue reading What Is Unified Threat Management? A Pragmatic Approach to Information Security

Rethinking the Industry’s Approach to the Cybersecurity Skills Gap

Until now, we’ve looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it’s time we look at the skills gap problem in different ways.

The post Rethinking the Industry’s Approach to the Cybersecurity Skills Gap appeared first on Security Intelligence.

Continue reading Rethinking the Industry’s Approach to the Cybersecurity Skills Gap

7 Ways to Identify Darknet Cybersecurity Risks

Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.

The post 7 Ways to Identify Darknet Cybersecurity Risks appeared first on Security Intelligence.

Continue reading 7 Ways to Identify Darknet Cybersecurity Risks

Staying Ahead of the Threat Landscape

Radware fends off thousands of attacks on a daily basis, resulting in thousands of satisfied customers around the world. However, the evolutionary nature of the cyberattack threat landscape requires every defender to adapt to changing attacks that are… Continue reading Staying Ahead of the Threat Landscape

Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics

While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there’s evidence the adversary is already using algorithms to their advantage.

The post Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics appeared first on Security Intelligence.

Continue reading Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics

UK at growing risk of major cyber incidents, terrorist attacks, research suggests

New data from a report on the UK threat landscape indicates the country’s emergency services are at risk of a major cyber-attack, which could open the door to terrorist attacks as well. Historically, the sovereign country has had one of the highe… Continue reading UK at growing risk of major cyber incidents, terrorist attacks, research suggests