Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving…
Tag: Security Intelligence
Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM
Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving…
Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM
Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving…
Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM
Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving…
Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM
Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving…
How Do Data Breaches Impact Economic Instability?
Geopolitical conflict, inflation, job market pressure, rising debt — we’ve been hearing about economic headwinds for a while now. Could data breaches have anything to do with this? According to a recent IBM report, the average cost of a data…
How the US Government is Fighting Back Against Ransomware
As ransomware-related payments surged toward $600 million in the first half of 2021, the U.S. government knew it needed to do more to fight back against cyber criminals. For many years, the Treasury’s Office of Foreign Assets Control (OFAC) had…
What You Should Know About the Honda Key Fob Vulnerability
As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first time and saw all the different ways it linked to…
Digital Transformation and Risk Management Must Go Together
The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating: Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in…
Digital Transformation and Risk Management Must Go Together
The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating: Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in…
What Experts Had To Say About the 2022 Cost of a Data Breach Report
The 2022 Cost of a Data Breach report was eagerly anticipated by cybersecurity professionals and the technology industry as a whole. Following two years of increased remote work and other changes due to the pandemic, the report was an important…
Why Do Ransomware Gangs Keep Coming Back From the Dead?
Ransomware gangs are major players in the cybersecurity space, especially in recent years. ZDNet reported that ransomware gangs increased their payments by over 311% from 2019 to 2020, with totals for all groups exceeding $350 million in 2020. Ransoms continued…
To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You
Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’ tactics and motives have been constant. Even the cybercriminal psyche…
What CISOs Want to See From NIST’s Impending Zero Trust Guidelines
Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises…
What CISOs Want to See From NIST’s Impending Zero Trust Guidelines
Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises…
Cost of a Data Breach: Infrastructure
During the pandemic, businesses and consumers saw firsthand what happens when infrastructure fails. In 2019, the global critical infrastructure protection (CIP) market size was valued at $96.30 billion. It is predicted to grow to $154.59 billion by 2027, with a…
3 Keys to an Effective Enterprise IT Risk Management Strategy
The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data Breach report. In addition, laws are holding board members personally…
Making the Leap: The Risks and Benefits of Passwordless Authentication
The password isn’t going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future. …
Companies Without Zero Trust Could Lose $1M More During a Data Breach
In recent years, the mindset for cybersecurity has shifted. It isn’t a matter of if a company has a breach, but rather when a company has a breach. With the increase in cybersecurity incidents, most if not all companies will be…
How IBM Secured the 2022 US Open
Throughout the US Open Tennis Championship, the infrastructure for USOpen.org and the mobile apps can see upwards of 3 million security events. While the vast majority of events are not serious, security analysts must quickly determine which are concerning to…
Does Follina Mean It’s Time to Abandon Microsoft Office?
As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility…
Does Follina Mean It’s Time to Abandon Microsoft Office?
As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility…
How IBM Secured the 2022 US Open
Throughout the US Open Tennis Championship, the infrastructure for USOpen.org and the mobile apps can see upwards of 3 million security events. While the vast majority of events are not serious, security analysts must quickly determine which are concerning to…
Companies Without Zero Trust Could Lose $1M More During a Data Breach
In recent years, the mindset for cybersecurity has shifted. It isn’t a matter of if a company has a breach, but rather when a company has a breach. With the increase in cybersecurity incidents, most if not all companies will be…
Getting Lost in an Encryption Maze? Try a Key Management System
Encryption is an essential part of any data security strategy. A key management system (KMS) can make encryption easier by enabling you to transform data to indecipherable cyphertext and control who can access it in clear text. That helps keep…
3 Reasons Why Technology Integration Matters
As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain…
Modern Data Security Needs a Modern Solution
The role of a data security analyst isn’t an easy one. It has always been hard to address data security because of the volume, speed and variety of data in the IT landscape. However, over the last few years, the…
A Response Guide for New NSA and CISA Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with input from the National Security Agency (NSA) and similar agencies…
What Kind of Data Costs Most in a Breach?
Today’s most valuable currency is data. Breaches, information operations, analytics and behavior recognition are all driven by data and the desire to possess it, regardless of what those who possess it want to do with it. We set out to…
Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments
While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the…
We’re Entering the Age of Unethical Voice Tech
In 2019, Google released a synthetic speech database with a very specific goal: stopping audio deepfakes. “Malicious actors may synthesize speech to try to fool voice authentication systems,” the Google News Initiative blog reported at the time. “Perhaps equally concerning,…
Survey Connects Cybersecurity Skills Gap to Increase in Breaches
The skills gap in cybersecurity isn’t a new concern. But, new research revealed in Fortinet’s 2022 Cybersecurity Skills Gap report confirmed what many experts have assumed. The skills gap increased risk and was likely the direct cause of at least…
Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line
In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty…
The Cost of a Data Breach for Government Agencies
What happens when attackers breach local government, police departments or public health services? What would happen if attackers compromised the U.S. Treasury’s network? These types of incidents happen every month and lead to service interruptions at the very least. More…
CISA Certification: What You Need to Know
The globally-recognized Certified Information Systems Auditor (CISA) certification shows knowledge of IT and auditing, security, governance, control and assurance to assess potential threats. As you can imagine, it’s very much in demand. It can also be confusing. Is CISA Certification…
Cyber insurance costs soar amid ransomware attacks
Ransomware attacks and recurring breaches cause insurers to rethink risk as prices rise and policies get increasingly harder to obtain. That cyberattacks have been on the rise is one fact we unfortunately read every year. The cost of these attacks…
Why Your Success Depends on Your IAM Capability
It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors…
Raspberry Robin and Dridex: Two Birds of a Feather
IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin…
What Should Customers Ask Managed Service Providers?
Managed service providers (MSPs), sometimes called managed security services (MSS) or MSSP, play a very important role in protecting data and other digital assets and will continue to do so. Some of the benefits include, but are not limited to:…
Cost of a Data Breach: Retail Costs, Risks and Prevention Strategies
Whether it’s online or brick-and-mortar, every new store or website represents a new potential entry point for threat actors. With access to more personally identifiable information (PII) of customers than most industries, bad actors perceive retail as a great way…
How and Why Do Teens Become Cyber Criminals?
The search to find the mastermind of the attacker group Lapsus$ led to a home outside Oxford, England. The suspected leader was a 16-year-old. He helped take down some of the world’s biggest companies, including Microsoft, from his mother’s house.…
How Cybersecurity Policy Has Changed Since the SolarWinds Attack
Major cyberattacks since 2019 jolted the U.S. government and software industry into action. The succeeding years have seen executive orders, new funding, two summits and a newfound resolve. Because of those attacks, the federal government aims to fix the open-source…
4 Ways AI Capabilities Transform Security
Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help. Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities…
Black Hat SEO: Is Someone Phishing With Your Site Domain?
Search engine optimization (SEO) is a long game. Improving your website to rank higher on search engine results pages helps you attract more traffic. Plus, it helps build a trustworthy reputation. But, some people want to take shortcuts by using…
The Ransomware Playbook Mistakes That Can Cost You Millions
If there is one type of cyberattack that can drain the color from any security leader’s face, it’s ransomware. A crippling, disruptive, and expensive attack to recover from, with final costs rarely being easy to foretell. Already a prevalent threat,…
Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface
You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices. These smart devices are the IoT in shadow IoT, and they could be maliciously or unintentionally exposing information. Threat actors can…
CISA or CVSS: How Today’s Vulnerability Databases Work Together
In the cybersecurity field, large databases of known threats and vulnerabilities have often been an essential resource. These catalogs show you where to focus your efforts. They’re also a good tool for prioritizing patches to increase security and mitigate the…
How EDR Security Supports Defenders in a Data Breach
The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data…
From Ramnit To Bumblebee (via NeverQuest): Similarities and Code Overlap Shed Light On Relationships Between Malware Developers
A comparative analysis performed by IBM Security X-Force uncovered evidence that suggests Bumblebee malware, which first appeared in the wild last year, was likely developed directly from source code associated with the Ramnit banking trojan. This newly discovered connection is…
Healthcare Breaches Costliest for 12 Years Running, Hit New $10.1M Record High
IBM Security and the Ponemon institute release an annual report known as one the most significant industry benchmarks. The Cost of a Data Breach analysis examines real-world breaches in great detail, producing insights into the factors that impact the cost…
How to Remediate a Cross-Site WebSocket Vulnerability
Today, many leading industries and modern enterprises have switched from processing and acting on data stored in databases to data in flight. How? Through real-time applications. One way to enable this is WebSocket, but it comes with vulnerabilities as well. …
X-Force 2022 Insights: An Expanding OT Threat Landscape
This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of…
Prepare for Quantum Encryption Today
Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in…
Incident Response for Health Care IT: Differences and Drivers
Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be…
How to Compromise a Modern-Day Network
An insidious issue has been slowly growing under the noses of IT admins and security professionals for the past twenty years. As companies evolved to meet the technological demands of the early 2000s, they became increasingly dependent on vulnerable technology…
Security Automation Can Save You $3.05M in a Data Breach
When it comes to reducing security breach costs, companies with security artificial intelligence (AI) and automation can save millions, per a new report. According to the most recent IBM Cost of a Data Breach Report, organizations with fully deployed security AI…
Controlling the Source: Abusing Source Code Management Systems
For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within…
9 Factors to Consider Before Choosing a UEM Solution
The more of your employees who work remotely some or all of the time, the more devices they’re likely to use to conduct business. Employees use their own devices as well as corporate ones, making already-challenged cybersecurity systems more complex.…
Everything CISOs Need to Know About NIST
It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020. Without a plan, maintaining a robust security posture is an uphill struggle. Thankfully, the National Institute…
Fishy Business: What Are Spear Phishing, Whaling and Barrel Phishing?
For threat actors, phishing embodies the holy trinity of goals: easy, effective and profitable. It’s no wonder that the 2022 X-Force Threat Intelligence Index reports that phishing was the top method used by attackers to breach an organization. Of all…
Cybersecurity and the Metaverse: Patrolling the New Digital World
The metaverse is a hot topic, and it’s easy to see why. It promises a 3D model of the internet, where virtual reality (VR) and mixed reality offer endless escapism. It provides a place parallel to the physical world where…
Cost of a Data Breach: Banking and Finance
The importance of cybersecurity has touched almost every industry. Beyond that, robust cybersecurity is table stakes for several sectors, particularly health care and the banking and finance industry. Not only is financial data at risk, but so is customer trust.…
The Past, Present and Future of Endpoint Management Solutions
Endpoint management is a simple concept that’s become more complex over time. Initially, it was about provisioning and managing the computers and devices that people use in your organization in the bring your own device (BYOD) and mobile computing era.…
Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program
You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why…
How to Prepare for and Respond to a Data Privacy Breach
Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different versions of the word meant the same thing. However, I’ve…
NIST Supply Chain Security Guidelines: 10 Key Takeaways
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) recently published updated guidance for reducing cybersecurity risks in supply chains. Titled “Software Supply Chain Security Guidance,” the update is NIST’s response to directives issued by an executive…
What’s New in the 2022 Cost of a Data Breach Report
The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. The…
Cybersecurity Needs to Work Even When Employees Aren’t on Board
Goldman Sachs leadership didn’t get the response they expected from their return to the office (RTO) order. In fact, Fortune reported that only about half of the company’s employees showed up. With today’s tight labor market and many employers allowing…
U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack
More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed…
20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet
It was considered the “largest ever” internet attack in 2002. This distributed denial of service attack hit seven of the 13 servers at the top of the internet’s domain name system hierarchy. Now, 20 years later, its origins remain mysterious,…
Boost SAP Security With Zero Trust
How can your organization improve its Systems Applications and Products (SAP) risk posture? Aligning with the key principles of zero trust through tangible and specific measures is one way. To begin, let’s define the principles of zero trust. We’ve all…
Hospital Ransomware Attack: Here’s What a Cybersecurity Success Story Sounds Like
Major ransomware attacks are scary, but against hospitals, they are even worse. One notable attack in August 2021 forced Ohio’s Memorial Health System emergency room to shut down (patients were diverted to other hospitals). In all hospital attacks, the health,…
A Common Mission: Improve the Cybersecurity Posture of the Nation
Securing information and infrastructure is among the highest national security priorities. In recent months and years, we continue to see an escalating sophistication and frequency of attacks by malicious actors and nation-states. In response, leaders are taking action. The Executive…
Security Obscurity Versus Ethical Hackers: Who’s Right?
Security breaches can lead to damage to a business’s finances, operations and reputation. What many companies might fear most is the latter: damage to their reputation. This may explain why 65% of organizations want to be seen as infallible, as…
What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’
After decades of playing defense, the United States government went on the offense in the past few years against global state-sponsored cyber attackers. U.S. Cyber Command conducted “hunt forward” operations recently in 16 countries, including in Ukraine, as part of…
6 Ways SASE Helps Protect Your Data
You start to log in to work from the home office you’ve occupied for the last two years only to sit and wait patiently as your virtual private network (VPN) dials up. After a few minutes, it validates your credentials.…
Why Threat Analysis Will Continue to Play a Vital Role in Security
Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and false alarms across multiple systems come in amid a severe shortage of skilled workers. In this industry, performing detailed threat…
5 Essential Steps for Every Ransomware Response Plan
This post was written with contributions from Andrew Gorecki, Camille Singleton and Charles DeBeck. May and June bring warm weather, backyard barbecues and, in recent years, an uptick in ransomware attacks. Why? “It’s possible workers are distracted because the sun…
Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World
The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business leaders in restructuring where and how people go about their jobs. As much as workers like…
One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem
The Colonial Pipeline cyberattack is still causing ripples. Some of these federal mandates may mark major changes for operational technology (OT) cybersecurity. The privately held Colonial Pipeline company, which provides nearly half of the fuel used by the East Coast…
Endpoint Detection and Response: How To Choose the Right EDR Solution
A rise in remote work trends has led to a rapid increase and interconnectivity of endpoints and data in recent years. This ‘next normal’ way of working comes with its own set of security challenges – from the rise in…
What Is Endpoint Detection and Response?
Endpoint Detection and Response: How To Choose the Right EDR Solution A rise in remote work trends has led to a rapid increase and interconnectivity of endpoints and data in recent years. This ‘next normal’ way of working comes with…
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine
Following ongoing research our team, IBM Security X-Force has uncovered evidence indicating that the Russia-based cybercriminal syndicate “Trickbot group” has been systematically attacking Ukraine since the Russian invasion — an unprecedented shift as the group had not previously targeted Ukraine.…
Securing Cloud Technology in a Growing Threat Landscape
Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also…
How to Secure Your SAP Environment
The protection of the SAP systems, as mission-critical applications, is becoming the priority for the most relevant organizations all over the world. The security hardening of SAP systems is key in these uncertain times, where threat actors start seeing SAP…
Why Phishing Is Still the Top Attack Method
Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email signature look like? What’s the color and size of the…
Is 2022 the Year of Secure Access Service Edge?
In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps, APIs, devices and Internet of Things (IoT) shows us no…
4 Ways AI Capabilities Transform Security
Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help. Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and…
Five Key Trends on SOC Modernization
For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in the industry. XDR was one of the hottest topics at…
Digital Shadows Weaken Your Attack Surface
Every tweet, text, bank transaction, Google search and DoorDash order is part of your digital shadow. We all have one, and the contents of your shadow aren’t always private. For example, in April 2021 attackers leaked data containing the personal information…
5 Ways to Retain More Cybersecurity Professionals at Your Organization
Companies that have low retention rates are likely to increase their risk of a cybersecurity attack. The recent ISACA’s State of the Cybersecurity Workforce study found that 69% of respondents whose companies faced more attacks in the past year report…
Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty
Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers? Difficulties and Positive Changes The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not…
The C-Suite Is Optimistic About Ransomware. Are They Right?
The majority of C-suite executives are confident in their organization’s protection against ransomware attacks. At least, that’s what a recent research report from ISC2 shows. In fact, just 15% express a lack of confidence. Does this confidence take into account…
Who Is Legally Responsible for a Cyber Incident?
After a company discovers a cyber attack on its network, the finger-pointing begins. The CEO blames the chief information security officer (CISO). The CISO blames the financial officers for not setting aside enough money for cyber defenses. The chief information…
Looking for Cyber Insurance? Know Your Eligibility
This article has been indexed from Security Intelligence Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had to answer…
Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services
This article has been indexed from Security Intelligence Does the world need another acronym? Probably not. But it seems like one is born every day in the cybersecurity market. As a tradeoff for the brain power to recall their cryptic…
How to Become World Class at Cyber Hygiene
This article has been indexed from Security Intelligence In a recent podcast from England Rugby Union coach Eddie Jones, he made reference to the adage about trying to be “world-class at things that require zero effort.” Relating that adage…
How to Make Business Practices That Support Cybersecurity Response
This article has been indexed from Security Intelligence Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more common form,…
One Size Does Not Fit All Organizations
This article has been indexed from Security Intelligence Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a home office…
Why Phishing Is Still the Top Attack Method
This article has been indexed from Security Intelligence Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email signature look…