Third-party access: The overlooked risk to your data protection plan

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping […]

The post Third-party access: The overlooked risk to your data protection plan appeared first on Security Intelligence.

Continue reading Third-party access: The overlooked risk to your data protection plan

Most organizations want security vendor consolidation

Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging. We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. […]

The post Most organizations want security vendor consolidation appeared first on Security Intelligence.

Continue reading Most organizations want security vendor consolidation

Reach Out to Peers and Vendors to Build Your Security

Cyberattacks don’t happen in a vacuum. While your organization may be specifically targeted by cybercriminals, the style of attack they are using isn’t unique to you. It’s one they will use over and over, especially if it is successful, and will sell on the Dark Web for other cyber criminals to buy, use and modify. […]

The post Reach Out to Peers and Vendors to Build Your Security appeared first on Security Intelligence.

Continue reading Reach Out to Peers and Vendors to Build Your Security

Keebin’ with Kristina: the One With the Curved Typewriter

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Aerodox Flies on Wireless Wings [Simon Merrett] didn’t know anything about keyboards when he started this project, but he didn’t let that stop him. [Simon] did what any of us …read more Continue reading Keebin’ with Kristina: the One With the Curved Typewriter

Using Vendor Management to Defend Against Supply Chain Attacks

Supply chain attacks are growing more common. According to the Identity Theft Resource Center (ITRC), there were just 19 supply chain attacks in the final quarter of 2020. In the following quarter, that volume grew to 27 attacks — an increase of 42%. Those incidents in Q1 2021 affected 137 U.S. groups and a total […]

The post Using Vendor Management to Defend Against Supply Chain Attacks appeared first on Security Intelligence.

Continue reading Using Vendor Management to Defend Against Supply Chain Attacks

Adopting Microsegmentation Into Your Zero Trust Model, Part 2

This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here. Organizations are increasingly using a zero trust approach combined with microsegmentation to carefully balance the needs of security and access. Companies work with most vendors on a purely transactional basis — those vendors simply […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 2 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 2

Sloppy patches are a breeding ground for zero-day exploits, says Google

Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in their software. In a blog post, Maddie Stone of Go… Continue reading Sloppy patches are a breeding ground for zero-day exploits, says Google

5 Indicators of Cyber Security Market Failure

Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook description would be something that articulated the “inefficient distribution of goods and… Continue reading 5 Indicators of Cyber Security Market Failure

Thirty-four years – System Administration, Backups, and Data Centers (Part 5)

As a side effect of building and running the backbone, I introduced UNIX systems into what was then a wholly VMS organization. We initially used Linux – roughly from 1994 – 1997, then over the next 20+ years, briefly migrated to Solaris x86, then to S… Continue reading Thirty-four years – System Administration, Backups, and Data Centers (Part 5)