Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to minimize risk?

The post Take a Bite Out of Sweyn appeared first on Security Intelligence.

Continue reading Take a Bite Out of Sweyn

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

Measuring Security Risk in a Medical IoT World

To reduce cybersecurity risk, silos among internet of things (IoT) technologies and hospital teams should be broken down and impact across four pillars should be weighed.

The post Measuring Security Risk in a Medical IoT World appeared first on Security Intelligence.

Continue reading Measuring Security Risk in a Medical IoT World

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What kinds of state and local government institutions are being targeted by cybercriminals? And what can we learn from recent municipal cyberattacks?

The post Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks? appeared first on Security Intelligence.

Continue reading Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The findings in the 2020 X-Force Threat Intelligence Index highlight the most common attack vectors, the evolution of ransomware and malware, the risks posed by inadvertent insiders and more.

The post X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020 appeared first on Security Intelligence.

Continue reading X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

Use Cases of the Bricata Platform for Better Network Security

The Bricata platform supports a range of network security use cases from DIY fatigue to connecting networks after M&A
The post Use Cases of the Bricata Platform for Better Network Security appeared first on Security Boulevard.
Continue reading Use Cases of the Bricata Platform for Better Network Security