Category: Security Intelligence

Cookie Hijacking: More Dangerous Than it Sounds

Read the original article: Cookie Hijacking: More Dangerous Than it Sounds Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack…

Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

Read the original article: Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors. As…

Are Cloud-Native IAM Controls Good Enough for Your Enterprise?

Read the original article: Are Cloud-Native IAM Controls Good Enough for Your Enterprise? Organizations of every type and size are looking to the cloud for a multitude of benefits, including agility, quick time-to-value, cost savings and scalability. But enterprise-scale deployments…

Consent Management: Picking the Right CIAM Strategy

Read the original article: Consent Management: Picking the Right CIAM Strategy Practically everything consumers do online — shopping, paying bills and signing up for new services — requires some level of personal data sharing or changing privacy settings. Consumers need…

5 Cloud Security Must-Haves in 2021

Read the original article: 5 Cloud Security Must-Haves in 2021 Organizations undertaking the move to the cloud face a blizzard of sometimes confusing buzzwords. There’s hybrid cloud, multicloud, digital transformation, microservices and so much more. While these terms can be…

Women in Cybersecurity: Why Diversity Matters

Read the original article: Women in Cybersecurity: Why Diversity Matters March is Women’s History Month, so it’s a perfect time of the year to look back and see how far women in cybersecurity have come. From pioneering tech to achieving…

Retail Cybersecurity: How to Protect Your Customer Data

Read the original article: Retail Cybersecurity: How to Protect Your Customer Data In the early days of the pandemic, many retailers quickly launched e-commerce stores for the first time. Others expanded their offerings, such as adding online ordering with curbside…

Top 10 Cybersecurity Vulnerabilities of 2020

Read the original article: Top 10 Cybersecurity Vulnerabilities of 2020 What cybersecurity vulnerabilities new and old should organizations look out for this year? Let IBM X-Force be your guide to today’s top cybersecurity threats with this detailed report.  First, scanning…

Don’t Speed Past Better Cloud App Security

Read the original article: Don’t Speed Past Better Cloud App Security They say you can only have two of three — fast, good and cheap. When it comes to developing cloud-based applications, I think that a fourth criteria should be…

Cybersecurity Trends and Emerging Threats in 2021

Read the original article: Cybersecurity Trends and Emerging Threats in 2021 The year 2021 is finally here, bringing with it the promise of a brighter future — but a long road ahead. In this piece, we’ll dive into five cybersecurity…

Security Automation: The Future of Enterprise Defense

Read the original article: Security Automation: The Future of Enterprise Defense When it comes to giving cyber security experts the tools they need to take action, automation and machine learning (ML) can make a big difference. Many companies are working…

How a CISO’s Executive Role Has Changed

Read the original article: How a CISO’s Executive Role Has Changed Ever since the role of the chief information security officer (CISO) was first created in 1994, the position has been treated like the pesky youngest sibling in the C-suite…

Manufacturing Cybersecurity Threats and How To Face Them

Read the original article: Manufacturing Cybersecurity Threats and How To Face Them With manufacturing cybersecurity threats on the rise, what should companies know about protecting their digital assets in the future?  Risks to Security in Manufacturing The number of ransomware…

The Uncertainty of Cybersecurity Hiring

Read the original article: The Uncertainty of Cybersecurity Hiring Cybersecurity hiring is going through a weird phase. The pandemic, the remote work movement, budget changes and the rising aggression and refinement of cyber attacks are all major shifts. Through it…

Firewall Services and More: What’s Next for IT?

Read the original article: Firewall Services and More: What’s Next for IT? Firewall services, cloud network protection tools and other IT defense staples are seeing a lot of changes in 2021. IT landscapes are growing more complex, as are the…

Solving 5 Challenges of Contact Tracing Apps

Read the original article: Solving 5 Challenges of Contact Tracing Apps Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a…

Unleash the Power of MITRE for a More Mature SOC

Read the original article: Unleash the Power of MITRE for a More Mature SOC The MITRE adversarial tactics, techniques and common knowledge (ATT&CK) framework brings pooled knowledge from across the cyber defense community, including revealing what threat actors are up to…

Network Segmentation Series: What is It?

Read the original article: Network Segmentation Series: What is It? This is the first in a series of three blog posts about network segmentation.  Many businesses are looking to augment their defenses by changing their approach to network security. Take…

Why Every Company Needs a Software Update Schedule

Read the original article: Why Every Company Needs a Software Update Schedule Software without the most recent patch is like an unlocked door for threat actors. They know the openings are there and can just walk in. But patching and…

5 Ways to Overcome Cloud Security Challenges

Read the original article: 5 Ways to Overcome Cloud Security Challenges During the second quarter of 2020 — for the first time in history — customers worldwide spent more on public cloud systems than on investments in non-cloud IT systems.…

AI Security: Curation, Context and Other Keys to the Future

Read the original article: AI Security: Curation, Context and Other Keys to the Future Security leaders need to cut through the hype when it comes to artificial intelligence (AI) security. While AI offers promise, buzzwords and big-picture thinking aren’t enough…

Boost Your Organization’s Digital Security With Zero Trust

Read the original article: Boost Your Organization’s Digital Security With Zero Trust Organizations are increasingly creating zero trust policies to augment their digital security postures. According to Infosecurity Magazine, 15% of organizations say they implemented a zero trust policy by…

Employee Mental Health: Managing Stress and Trauma

Read the original article: Employee Mental Health: Managing Stress and Trauma For many people working in cybersecurity, employee mental health could be a bigger part of our days. Our jobs entail a lot of putting out fires and being hyper-vigilant…

Intro to DevSecOps: Why Integrated Security is Key in 2021

Read the original article: Intro to DevSecOps: Why Integrated Security is Key in 2021 The unprecedented events of 2020 only accelerated the adoption of cloud-based business models. These highly scalable solutions and services have made work easier for employees calling…

5 Ways Companies Can Protect Personally Identifiable Information

Read the original article: 5 Ways Companies Can Protect Personally Identifiable Information Protecting personally identifiable information (PII) is one of the key aspects of a security expert’s job. What does personally identifiable information include? Social Security numbers, birth dates and…

How Doxing Affects Gen Z

Read the original article: How Doxing Affects Gen Z In the past, public and famous figures had to worry most about doxing. Two men were arrested in New York for doxing after posting home addresses and Social Security numbers of…

School’s Out for Ransomware

Read the original article: School’s Out for Ransomware When I was growing up, snow days (days off for inclement weather or heavy snowfall) weren’t uncommon. We’d get 24 hours or so of freedom, then mother nature would eventually step in…

How to Shut Down Business Units Safely

Read the original article: How to Shut Down Business Units Safely A nimble organization needs to be ready for growth — and cuts. Sometimes business closure or shutting down a unit is needed, either as part of the evolution of…

Consider the Human Angle in Your Threat Modeling

Read the original article: Consider the Human Angle in Your Threat Modeling When it comes to threat modeling, many businesses plan as if there were only a few possible scenarios in which cybersecurity or privacy-related incidents could occur. We need…

CISO Success: It’s About More Than Tech Skills

Read the original article: CISO Success: It’s About More Than Tech Skills The chief information security officer (CISO) is a relatively new position in the C-suite. It’s about 25 years old or less, depending on whom you ask. But, it…

Is the End of the Firewall in Sight?

Read the original article: Is the End of the Firewall in Sight? Is a firewall a thing of the past? People have been questioning the utility of firewalls for years. Columnist and editor Roger A. Grimes wrote that “firewalls need…

Password Safety: Rethink Your Strong Password

Read the original article: Password Safety: Rethink Your Strong Password “Use longer, stronger passwords.” This is a directive we’ve been accustomed to hearing for decades. Many of us are using strong passwords with a combination of uppercase letters, lowercase letters,…

Triage Attacks More Efficiently With AI for Cybersecurity

Read the original article: Triage Attacks More Efficiently With AI for Cybersecurity Think of cybersecurity like your personal health. In cybersecurity, basic cyber hygiene foils most cyber attacks. With a shortage of cyber experts, just as in medicine, finding faster…

How is Enterprise Security Like Writing a Novel?

Read the original article: How is Enterprise Security Like Writing a Novel? Pen, paper and ink alone do not make a novel. In the same way, anti-malware, firewalls and SIEM tools alone do not make an enterprise secure. Too many…

For Attackers, Home is Where the Hideout Is

Read the original article: For Attackers, Home is Where the Hideout Is Remember the good ol’ days of playing hide-and-seek? It’s hard to forget the rush of finding the perfect hiding place. I remember crouching into a tiny ball behind…

QR Code Security: What You Need to Know Today

Read the original article: QR Code Security: What You Need to Know Today QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and…

Hybrid Cloud Adoption Brings Security on the Go

Read the original article: Hybrid Cloud Adoption Brings Security on the Go Hybrid cloud environments are a common sight in today’s digital world. IBM’s Assembling Your Cloud Orchestra report found 85% of organizations already utilize a hybrid cloud and 98%…

Preparing a Client Environment for Threat Management

Read the original article: Preparing a Client Environment for Threat Management A key part of making any threat management program successful is ensuring it maps properly to the client’s needs. In the past, this has been challenging for many groups…

5 Cybersecurity Best Practices For Planning Ahead

Read the original article: 5 Cybersecurity Best Practices For Planning Ahead Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against…

What is STRIDE and How Does It Anticipate Cyberattacks?

Read the original article: What is STRIDE and How Does It Anticipate Cyberattacks? STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For…

Cybersecurity for Healthcare: Addressing Medical Image Privacy

Read the original article: Cybersecurity for Healthcare: Addressing Medical Image Privacy Medical imaging devices have greatly improved patient care and become a critical part of modern medical treatment. But, these devices weren’t always connected in ways they are today. Today’s…

Cybersecurity Ethics: Establishing a Code for Your SOC

Read the original article: Cybersecurity Ethics: Establishing a Code for Your SOC Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work.  Being part of a high-performing computer security incident response team (CSIRT) or…

Why Red Team Testing Rules the Cloud

Read the original article: Why Red Team Testing Rules the Cloud Red team testing is a key way to help prevent data breaches today. Most cyber defense focuses on spotting openings and fixing general risks in your environment. Red teaming…

Biometrics: Choosing the Right Option for Your Security

Read the original article: Biometrics: Choosing the Right Option for Your Security Do you know who your customers are? Not their demographics, but each customer as they enter your online portal and provide their name, address and credit card number.…

Best Practices for Securing Modern Data Architecture

Read the original article: Best Practices for Securing Modern Data Architecture Today’s cloud-native data management platforms can help businesses unlock the potential of their data. These modern data management and storage platforms are designed to deliver lean, high-performance architecture for…

5 IoT Threats To Look Out for in 2021

Read the original article: 5 IoT Threats To Look Out for in 2021 As we bring 2020 to a close, it’s time to look at 2021 and a new chapter in the book of cybersecurity. While there are no doubt…

7 Cybersecurity Tools On Our Holiday Wish List

Read the original article: 7 Cybersecurity Tools On Our Holiday Wish List The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing…