Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What kinds of state and local government institutions are being targeted by cybercriminals? And what can we learn from recent municipal cyberattacks?

The post Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks? appeared first on Security Intelligence.

Continue reading Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government have increased dramatically over the last several years. What is it about municipal organizations and governments that makes them such attractive targets?

The post Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government appeared first on Security Intelligence.

Continue reading Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Containers in the Cloud: False Assumptions and Security Challenges

Strengthening container security in the cloud starts with addressing the misconception that containers automatically provide security for the applications inside them.

The post Containers in the Cloud: False Assumptions and Security Challenges appeared first on Security Intelligence.

Continue reading Containers in the Cloud: False Assumptions and Security Challenges

How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

Despite hackers’ successes, we’re still being mistaken for criminals in hoodies — a misconception that has helped keep the skills gap, especially when it comes to offensive security, as wide as ever.

The post How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals appeared first on Security Intelligence.

Continue reading How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

Shifting From Ransomware Detection to Prevention

While prevention is no easy feat, there are steps that can reduce the risk of opportunistic ransomware attacks, including running backups and embedding threat intelligence.

The post Shifting From Ransomware Detection to Prevention appeared first on Security Intelligence.

Continue reading Shifting From Ransomware Detection to Prevention

How to Start Building an Insider Threat Program

Sometimes it only takes one moment, one life-changing incident, to turn the most trustworthy employee into an insider threat.

The post How to Start Building an Insider Threat Program appeared first on Security Intelligence.

Continue reading How to Start Building an Insider Threat Program

Why Cities Shouldn’t Pay Ransomware Criminals

Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns.

The post Why Cities Shouldn’t Pay Ransomware Criminals appeared first on Security Intelligence.

Continue reading Why Cities Shouldn’t Pay Ransomware Criminals

How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

Organizations in the private sector are adopting link analysis tools that automatically gather disparate sources of threat intelligence on a single pane of glass.

The post How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient appeared first on Security Intelligence.

Continue reading How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

8 ‘Must-Haves’ that Today’s Security Policies Need to Include

As we’ve blogged about previously, the security response to phishing attacks and other cybersecurity […]
The post 8 ‘Must-Haves’ that Today’s Security Policies Need to Include appeared first on Security Boulevard.
Continue reading 8 ‘Must-Haves’ that Today’s Security Policies Need to Include

Why Fraudsters Are Flying High on Airline Loyalty Programs

Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought.

The post Why Fraudsters Are Flying High on Airline Loyalty Programs appeared first on Security Intelligence.

Continue reading Why Fraudsters Are Flying High on Airline Loyalty Programs