Another category? Why we need ITDR

Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in […]

The post Another category? Why we need ITDR appeared first on Security Intelligence.

Continue reading Another category? Why we need ITDR

Detecting Insider Threats: Leverage User Behavior Analytics

Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% […]

The post Detecting Insider Threats: Leverage User Behavior Analytics appeared first on Security Intelligence.

Continue reading Detecting Insider Threats: Leverage User Behavior Analytics

User Behavior Analytics: What It Is and How It Advances Digital Security

Organizations are struggling to pinpoint threats that come from real user accounts. Take insider threats, as an example. In a 2020 report, 68% of IT and security experts felt their employers were somewhat or very at risk to insider attacks. Over half (53%) said it had become at least somewhat harder to detect an insider attack […]

The post User Behavior Analytics: What It Is and How It Advances Digital Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: What It Is and How It Advances Digital Security

Zero Trust and Insider Threats: Was Brutus the Original Bad Actor?

Insider threats have been a problem for as long as there have been insiders. What’s changed over time? Well, for one, Brutus and his conspirators didn’t exactly leave a trail of logs and flows when they plotted against Julius Caesar and the Roman Republic. Fast forward 2,000 years, and there’s a good news/bad news update […]

The post Zero Trust and Insider Threats: Was Brutus the Original Bad Actor? appeared first on Security Intelligence.

Continue reading Zero Trust and Insider Threats: Was Brutus the Original Bad Actor?

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Biden, […]

The post #TwitterHack: Power, Privilege and Pandemic appeared first on Security Intelligence.

Continue reading #TwitterHack: Power, Privilege and Pandemic

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.

The post State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends appeared first on Security Intelligence.

Continue reading State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

How Deepfakes Will Make Us Question Everything in 2020

If anyone can claim that what they said was the result of a deepfake, how can we distinguish the truth anymore?

The post How Deepfakes Will Make Us Question Everything in 2020 appeared first on Security Intelligence.

Continue reading How Deepfakes Will Make Us Question Everything in 2020

How to Protect Your Organization From Evolving Phishing Attacks

Protecting against evolving phishing attacks requires robust security awareness training for users and some help from technologies like artificial intelligence and ahead-of-threat detection.

The post How to Protect Your Organization From Evolving Phishing Attacks appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Evolving Phishing Attacks

What Are Insider Threats and How Can You Mitigate Them?

There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose.

The post What Are Insider Threats and How Can You Mitigate Them? appeared first on Security Intelligence.

Continue reading What Are Insider Threats and How Can You Mitigate Them?