Grandma or the Wolf? Red Gets Smart About Fraud Protection

When Red spots suspicious activity on Grandma’s account, she needs a dynamic fraud protection tool to determine whether it’s really her or a Big Bad Wolf.

The post Grandma or the Wolf? Red Gets Smart About Fraud Protection appeared first on Security Intelligence.

Continue reading Grandma or the Wolf? Red Gets Smart About Fraud Protection

Enterprise Mobility Management Even the Apprentice Can Control

To secure a full-time position at the end of his internship, the Apprentice must design an effective enterprise mobility management strategy.

The post Enterprise Mobility Management Even the Apprentice Can Control appeared first on Security Intelligence.

Continue reading Enterprise Mobility Management Even the Apprentice Can Control

‘In Security’ Web Comic, Episode 002: In the Boardroom

The EveryApp team learned that ransomware and other types of malware are no longer singular forces. This demands an integrated approach to cybersecurity.

The post ‘In Security’ Web Comic, Episode 002: In the Boardroom appeared first on Security Intelligence.

Continue reading ‘In Security’ Web Comic, Episode 002: In the Boardroom

What Is So Insecure About Cloud? Demystifying Cloud Security Transformation

Enterprise IT organizations must establish a clearly defined cloud strategy to navigate the many challenges related to cloud security.

The post What Is So Insecure About Cloud? Demystifying Cloud Security Transformation appeared first on Security Intelligence.

Continue reading What Is So Insecure About Cloud? Demystifying Cloud Security Transformation

UK Universities Make Rich Targets for Ransomware Attacks

Almost two-thirds of British universities fell victim to ransomware attacks in the past year, and the trend shows no signs of slowing down.

The post UK Universities Make Rich Targets for Ransomware Attacks appeared first on Security Intelligence.

Continue reading UK Universities Make Rich Targets for Ransomware Attacks

10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party

It was a birthday I’ll never forget. I know what you’re thinking: close friends, colorful streamers, a big birthday cake and Katy Perry’s “Birthday” softly playing the background. Nothing could be further from the truth. My quiet birthday dinner at a casual restaurant was interrupted by the rapid buzz of numerous emails being sent to […]

The post 10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party appeared first on Security Intelligence.

Continue reading 10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party

Don’t Trade One Security Analytics Platform Problem for Another

I haven’t seen much love lately for security information and event management (SIEM). To steal a phrase from Gartner, the security analytics platform seems to have entered the “trough of disillusionment.” But in deploying alternatives, some enterprises may be trading one problem for another. SIEM is great in concept. These tools were introduced about a […]

The post Don’t Trade One Security Analytics Platform Problem for Another appeared first on Security Intelligence.

Continue reading Don’t Trade One Security Analytics Platform Problem for Another

Biometric Authentication: Finding a Balance Between UX and IT Security

When it comes to authentication, most security professionals see it as a necessary evil. It provides security at the expense of the end user’s desire for a frictionless experience. That way of thinking, however, was challenged at the Opus Research Intelligent Authentication 2016 conference. The two-day event made a point to highlight authentication not only […]

The post Biometric Authentication: Finding a Balance Between UX and IT Security appeared first on Security Intelligence.

Continue reading Biometric Authentication: Finding a Balance Between UX and IT Security

In Prevention We Trust? When and How to Use Endpoint Detection and Response

Over the last few years, there has been a lot of talk about next-generation endpoint security and prevention tools versus endpoint detection and response solutions. Many clients ask the same questions about bolstering their security posture and balance budgets, including where to start, what to augment, what to replace and, most importantly, where to invest. […]

The post In Prevention We Trust? When and How to Use Endpoint Detection and Response appeared first on Security Intelligence.

Continue reading In Prevention We Trust? When and How to Use Endpoint Detection and Response

No Business Is Too Small for SMB Cybersecurity

Smaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has something of value that someone thinks is worth stealing, or a connection that someone thinks is […]

The post No Business Is Too Small for SMB Cybersecurity appeared first on Security Intelligence.

Continue reading No Business Is Too Small for SMB Cybersecurity