Hidden in Plain Sight: File System Protection With Cyber Deception

Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs.

The post Hidden in Plain Sight: File System Protection With Cyber Deception appeared first on Security Intelligence.

Continue reading Hidden in Plain Sight: File System Protection With Cyber Deception

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting

Threat hunting enables security teams to shift from simply responding to attacks to proactively identifying and mitigating threats before they hit enterprise networks.

The post On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting

A Fresh Look at Malware and Mobile Threat Prevention

Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.

The post A Fresh Look at Malware and Mobile Threat Prevention appeared first on Security Intelligence.

Continue reading A Fresh Look at Malware and Mobile Threat Prevention

Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.

The post Virtual Reality, Augmented Reality and Futuristic Threat Modeling appeared first on Security Intelligence.

Continue reading Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Nine Security Tips That Go Outside the Box

Even the most basic security measures can go a long way toward thwarting cybercrime. Use these simple yet effective security tips to protect your network.

The post Nine Security Tips That Go Outside the Box appeared first on Security Intelligence.

Continue reading Nine Security Tips That Go Outside the Box