Category: Security Intelligence

Accelerate Your Journey to AWS with IBM Security

This article has been indexed from Security Intelligence Security continues to be one of the top concerns for 90 percent of our clients adopting cloud. It’s further intensified with 75 percent of the clients embracing a multicloud deployment model. Cloud…

New CISA Blacklist: What It Means For You

This article has been indexed from Security Intelligence Everyone makes mistakes once in a while. Maybe not all the time, but who hasn’t reused a password or ignored a software update? But any time someone ignores security best practices adds…

How Ransomware Trends Are Changing Cyber Insurance

This article has been indexed from Security Intelligence The world of cyber insurance is in a state of flux. The reason: ransomware creates huge financial impacts. And how it will change insurance in the future is unclear. The insurance industry…

How AI Prevents Fatigue After Data Breaches

This article has been indexed from Security Intelligence I have data breach fatigue. Every day, my inbox is flooded with dozens of emails about the newest data breaches and what causes them. Five years ago, I took note of every company…

5 Ways to Defend Against Supply Chain Cyberattacks

This article has been indexed from Security Intelligence Cutting corners happens, more so in high-stakes, high-speed jobs. But from employees honest enough to admit when they push vulnerable code live, we can put together a portfolio of products shipped broken.…

How Number Recycling Threatens Your Privacy Online

This article has been indexed from Security Intelligence There’s a lot to think about when you or your employees get new mobile phones — plans, hardware, cost. But one thing many people don’t think about is number recycling, a common…

Data Encryption: Simplifying Enterprise Key Management

This article has been indexed from Security Intelligence Data encryption can help prevent malicious users and rogue processes from taking control of sensitive data. According to the 2021 Cost of a Data Breach report, the use of encryption is a top factor…

Ransomware Attacks: How to Protect your Data With Encryption

This article has been indexed from Security Intelligence Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. In 2021, ransomware has become a pervasive, newsworthy topic that competes as a…

Most Digital Attacks Today Involve Social Engineering

This article has been indexed from Security Intelligence On May 14, the FBI marked a sobering milestone: the receipt of its six millionth digital crime complaint. It took just 14 months for the FBI’s Internet Crime Complaint Center (IC3) to…

Spend Wisely (Not Just More) to Become Cyber Resilient

This article has been indexed from Security Intelligence Spending on cybersecurity is hitting record highs. And that makes sense. Because of big changes in how work gets done (plus the rising cost of breaches and attacks, like ransomware), companies are…

5 Ways to Increase Password Safety

This article has been indexed from Security Intelligence You make password decisions every week. Maybe you create a new account, reset a password or respond to a password change prompt. And each time you make a seemingly small or insignificant…

What’s New in the 2021 Cost of a Data Breach Report

This article has been indexed from Security Intelligence Has cybersecurity ever been more important than it is right now? Even in these extraordinary times, with its focus on manufacturing vaccines and getting shots into arms, new research in the Cost…

Double Encryption: When Ransomware Recovery Gets Complicated

This article has been indexed from Security Intelligence Ever hear of double extortion? It’s a technique increasingly employed by ransomware attackers. A malware payload steals a victim’s plaintext information before launching its encryption routine. Those operating the ransomware then go…

How AI Will Transform Data Security

This article has been indexed from Security Intelligence I’ve often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security. Yes, I love the convenience of online stores suggesting the perfect items…

API Abuse Is a Data Security Issue Here to Stay

This article has been indexed from Security Intelligence Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will be the most common…

Thriving in Chaos: How Cyber Resilience Works

This article has been indexed from Security Intelligence In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. Speakers at the RSA Conference 2021 talked about this in terms…

FragAttacks: Everything You Need to Know

This article has been indexed from Security Intelligence A cybersecurity researcher discovered a new category of Wi-Fi vulnerabilities recently. But the surprising news is that this new category is actually very old. Called FragAttacks, these 12 Wi-Fi vulnerabilities have existed since the…

3 Myths About Threat Actors and Password Safety

This article has been indexed from Security Intelligence You’ve seen the memes and the warnings on social media — answering questions about your life history is ruining your password safety. It’s giving the bad guys the information they need to…

What Is Domain-Driven Design?

This article has been indexed from Security Intelligence In the ever-growing software ecosystem, successful products need to have great performance, security, maintainability and usability. For the people who deliver those products, quality assurance, time to market and cost matter most.…

Attacks on Operational Technology From IBM X-Force and Dragos Data

This article has been indexed from Security Intelligence Operational Technology Threats in 2021: Ransomware, Remote Access Trojans and Targeted Threat Groups Organizations with operational technology (OT) networks face many unique — and often complicated — considerations when it comes to…

Data Security Along Every Stage of the Journey

This article has been indexed from Security Intelligence Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of…

XDR: The Central Nervous System of Zero Trust

This article has been indexed from Security Intelligence If zero trust is the brain that watches out for the health of the digital body, extended detection and response (XDR) serves as the nerves that bring it information. And as the…

Educating the Educators: Protecting Student Data

This article has been indexed from Security Intelligence I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His…

Confidential Computing: The Future of Cloud Computing Security

This article has been indexed from Security Intelligence Two years ago, a group of tech companies introduced a new roadmap for cloud computing security. Confidential computing “uses hardware-based techniques to isolate data, specific functions, or an entire application from the…

5 Global Supply Chain Security Threats (and How to Handle Them)

This article has been indexed from Security Intelligence In December 2020, a nation-state attack on the SolarWinds network management system compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With costs likely…

Cyber Gangs: Who Are They in 2021 and What Do They Want?

This article has been indexed from Security Intelligence Cyber crime gangs have been operating for years, but in recent months, they’ve shifted tactics. They’ve embraced new technologies, exploited new opportunities, delivered new payloads and sought out new targets. Their aim…

Securing Your Cloud Transformation Journey

This article has been indexed from Security Intelligence Cloud computing introduced a paradigm shift in how companies operated, maintained and spent on IT. Through its varied service models (IaaS, PaaS and SaaS), it offers companies the ability to spin up…

How to Get on the CISO Certification Path

This article has been indexed from Security Intelligence Cybersecurity workers are very proud of their certifications. Just check their email signatures for the alphabet of them: CISSP (certified information systems security professional), CISM (certified information security manager) and CCISO (certified chief…

Why the Worst Cloud Security Predictions Might Not Come True

This article has been indexed from Security Intelligence We’ve all heard dire predictions about the future of cybersecurity trends, especially cloud security. Internet of things (IoT) environments will expand the attack surface beyond control and encourage breaches. Hybrid offices will…

Cloud Security: Why Being Intentional in Encryption Matters

This article has been indexed from Security Intelligence Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud data, of…

Cyber Extortion: What You Need to Know in 2021

This article has been indexed from Security Intelligence Over the years, the term ransomware has taken on a new meaning for many businesses and local governments. This used to be considered a relatively new and emerging form of malware. Now, attackers have…

How the Rise of the Remote SOC Changed the Industry

This article has been indexed from Security Intelligence What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working a success for…