The C-Suite Is Optimistic About Ransomware. Are They Right?

The majority of C-suite executives are confident in their organization’s protection against ransomware attacks. At least, that’s what a recent research report from ISC2 shows. In fact, just 15% express a lack of confidence. Does this confidence take into account the nearly 53% rise in double extortion ransomware attacks between January and February? Are the […]

The post The C-Suite Is Optimistic About Ransomware. Are They Right? appeared first on Security Intelligence.

Continue reading The C-Suite Is Optimistic About Ransomware. Are They Right?

The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we are past just connecting devices. Now, we need to do something with that connection, which at this stage is called a session. This part of […]

The post The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as just the latest un-addressed number in the inbox. In an inbox-zero case, the latest new alert is the most urgent task. But in a backed-up, […]

The post ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue appeared first on Security Intelligence.

Continue reading ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

Cyberattacks can cause major loss of revenue for businesses and other groups of all sizes. As a result, cybersecurity insurance is being discussed more and more. The prospect of getting money back after an attack becomes increasingly appealing. But, is it right for every organization? What are the pros and cons? Who already has it? […]

The post Cybersecurity Insurance Pros and Cons: Is it the Best Policy? appeared first on Security Intelligence.

Continue reading Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

A Look at HTTP Parameter Pollution and How To Prevent It

With HTTP Parameter Pollution (HPP) attacks, threat actors can hide scripts and processes in URLs. First discovered in 1999, this technique can also allow threat actors to pollute the parameters in the URL and the request body. This could lead to behavior changes in the app, such as cross-site scripting, privilege changes or granting unwanted […]

The post A Look at HTTP Parameter Pollution and How To Prevent It appeared first on Security Intelligence.

Continue reading A Look at HTTP Parameter Pollution and How To Prevent It

Threat Hunting Techniques: A Quick Guide

Threat hunting is an essential part of security operations center services and should be incorporated at an early stage. Threat hunting is the art of finding the unknowns in the environment, going beyond traditional detection technologies, such as security information and event management (SIEM), endpoint detection and response (EDR) and others. There are multiple methods […]

The post Threat Hunting Techniques: A Quick Guide appeared first on Security Intelligence.

Continue reading Threat Hunting Techniques: A Quick Guide

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive training scenarios, essentially preparing and rehearsing […]

The post Why Cyber Ranges Are Effective To Train Your Teams appeared first on Security Intelligence.

Continue reading Why Cyber Ranges Are Effective To Train Your Teams

Focusing on the Fundamentals of Network Security

IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020.  Focus on Security Fundamentals   One of the key fundamental approaches for security is to ensure your security team can identify, investigate and respond to threats. We recommend mining network data to help identify potential […]

The post Focusing on the Fundamentals of Network Security appeared first on Security Intelligence.

Continue reading Focusing on the Fundamentals of Network Security

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate technical and organizational measures. While not […]

The post Future-Proofing Data With a Data Encryption Plan appeared first on Security Intelligence.

Continue reading Future-Proofing Data With a Data Encryption Plan

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase in use resulted from businesses adopting video conferencing platforms as a means to facilitate their transition […]

The post Video Conferencing Security Tips You May Have Overlooked appeared first on Security Intelligence.

Continue reading Video Conferencing Security Tips You May Have Overlooked