Security Intelligence Analysis and Insight for Information Security Professionals
- Protecting your digital assets from non-human identity attacksby Josh Nadeau on November 20, 2024 at 2:00 pm
Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps. The use of non-human identities (NHIs) to power business-critical applications — The post Protecting your digital assets from non-human identity attacks appeared first on Security Intelligence.
- Communication platforms play a major role in data breach risksby Jennifer Gregory on November 19, 2024 at 2:00 pm
Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it comes to cybersecurity, communicating means more than just talking to another person; it includes any The post Communication platforms play a major role in data breach risks appeared first on Security Intelligence.
- Cybersecurity dominates concerns among the C-suite, small businesses and the nationby Jonathan Reed on November 15, 2024 at 2:00 pm
Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data The post Cybersecurity dominates concerns among the C-suite, small businesses and the nation appeared first on Security Intelligence.
- Autonomous security for cloud in AWS: Harnessing the power of AI for a secure futureby Souvik Khamaru on November 14, 2024 at 2:00 pm
As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play. Security and compliance The post Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future appeared first on Security Intelligence.
- Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurityby Doug Bonderud on November 13, 2024 at 2:00 pm
Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities.” These actors pose a critical threat to United States infrastructure and protected data, and The post Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity appeared first on Security Intelligence.
- 6 Principles of Operational Technology Cybersecurity released by joint NSA initiativeby Josh Nadeau on November 12, 2024 at 2:00 pm
Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern. On October 2, 2024, the NSA (National Security Agency) released a new The post 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative appeared first on Security Intelligence.
- SpyAgent malware targets crypto wallets by stealing screenshotsby Doug Bonderud on November 8, 2024 at 2:00 pm
A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices. Here’s how to dodge the bullet. Attackers shooting their (screen) shot Attacks start — as always The post SpyAgent malware targets crypto wallets by stealing screenshots appeared first on Security Intelligence.
- Exploring DORA: How to manage ICT incidents and minimize cyber threat risksby Yannick Helmke on November 7, 2024 at 2:00 pm
As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM’s 2024 Cost of a Data Breach report. This underscores the need for robust IT The post Exploring DORA: How to manage ICT incidents and minimize cyber threat risks appeared first on Security Intelligence.
- What Telegram’s recent policy shift means for cyber crimeby Charles Owen-Jackson on November 6, 2024 at 2:00 pm
Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the user’s real The post What Telegram’s recent policy shift means for cyber crime appeared first on Security Intelligence.
- Skills shortage directly tied to financial loss in data breachesby Mike Elgan on November 5, 2024 at 2:00 pm
The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM’s 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year. And that’s expensive. This skills deficit adds an average of $1.76 million in The post Skills shortage directly tied to financial loss in data breaches appeared first on Security Intelligence.