AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool is vi… Continue reading AWS security essentials for managing compliance, data protection, and threat detection

What Are the Biggest Phishing Trends Today?

According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger attack such as ransomware. The Index also found that phishing was used in 41% of the attacks that X-Force remediated in 2021. That’s a 33% […]

The post What Are the Biggest Phishing Trends Today? appeared first on Security Intelligence.

Continue reading What Are the Biggest Phishing Trends Today?

Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Azure Defender for IoT – Microsoft’s new security solution for discovering unmanaged IoT/OT assets and IoT/OT vulnerabilities – is now in public preview and can be put to the test free of charge. The solution can alert administrators … Continue reading Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Measuring Security Operations Center Effectiveness Globally

Do you know what is it like to measure and optimize global security operations centers (SOCs)? At IBM Managed Security Services’ (MSS), we measure an SOC a bit like operating and managing the performance of a factory. It’s incredibly important to monitor and measure the performance of every component and how they all work together. […]

The post Measuring Security Operations Center Effectiveness Globally appeared first on Security Intelligence.

Continue reading Measuring Security Operations Center Effectiveness Globally

Mitigating Containers Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliver more power […]

The post Mitigating Containers Risk Requires a Comprehensive Approach appeared first on Security Intelligence.

Continue reading Mitigating Containers Risk Requires a Comprehensive Approach

6 Things to Do After Implementing Cybersecurity AI for Alert Management

Once cybersecurity AI automates threat monitoring tasks, what should infosec pros do next? Here are six ways to improve your post-AI security strategy.

The post 6 Things to Do After Implementing Cybersecurity AI for Alert Management appeared first on Security Intelligence.

Continue reading 6 Things to Do After Implementing Cybersecurity AI for Alert Management

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

With elevated endpoint risk and the need to respond rapidly to cybersecurity incidents, a managed detection and response (MDR) team can deploy quickly to virtually supplement your security teams.

The post COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface appeared first on Security Intelligence.

Continue reading COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. Learn more about building a threat model.

The post A Guide to Easy and Effective Threat Modeling appeared first on Security Intelligence.

Continue reading A Guide to Easy and Effective Threat Modeling

Machine Learning: With Great Power Come New Security Vulnerabilities

Understanding the basic vulnerabilities and prevention tactics associated with machine learning is the first step toward combating these emerging threats.

The post Machine Learning: With Great Power Come New Security Vulnerabilities appeared first on Security Intelligence.

Continue reading Machine Learning: With Great Power Come New Security Vulnerabilities

Practice Social Media Safety to Protect Both Personal and Enterprise Data

When it comes to social media safety, users are often unaware of the ramifications of their online posts. Many don’t realize they may be putting personal and even enterprise data at risk.

The post Practice Social Media Safety to Protect Both Personal and Enterprise Data appeared first on Security Intelligence.

Continue reading Practice Social Media Safety to Protect Both Personal and Enterprise Data