Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there’s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Continue reading Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

What Is SIEM and How Does It Enhance Threat Detection?

Reading Time: 3 minutes What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity.

The post What Is SIEM and How Does It Enhance Threat Detection? appeared first on Security Intelligence.

Continue reading What Is SIEM and How Does It Enhance Threat Detection?

From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals.

The post From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise appeared first on Security Intelligence.

Continue reading From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement

In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization’s risk exposure and its ability to handle cybersecurity risks.

The post In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement appeared first on Security Intelligence.

Continue reading In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement

How to Fight Back Against Macro Malware

Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity?

The post How to Fight Back Against Macro Malware appeared first on Security Intelligence.

Continue reading How to Fight Back Against Macro Malware

Why You Should Constantly Enrich Security Culture Throughout Your Organization

Here’s what you need to know about organizational security culture — and how to plan for and inspire a better one.

The post Why You Should Constantly Enrich Security Culture Throughout Your Organization appeared first on Security Intelligence.

Continue reading Why You Should Constantly Enrich Security Culture Throughout Your Organization

Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Researchers published two pieces of exploit code that can allow anyone to interact with an organization’s SAP enterprise resource planning platform and perform unauthorized transactions.

The post Published Exploits for Accessing SAP Systems Put Security Teams on Alert appeared first on Security Intelligence.

Continue reading Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Hunting for the True Meaning of Threat Hunting at RSAC 2019

Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it’s important to understand the difference between true threat hunting and marketing jargon.

The post Hunting for the True Meaning of Threat Hunting at RSAC 2019 appeared first on Security Intelligence.

Continue reading Hunting for the True Meaning of Threat Hunting at RSAC 2019

The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?

When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019.

The post The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts? appeared first on Security Intelligence.

Continue reading The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together