Security Intelligence Analysis and Insight for Information Security Professionals
- Whatâs behind unchecked CVE proliferation, and what to do about itby Jonathan Reed on November 1, 2024 at 1:00 pm
The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizationsâ cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified. Meanwhile, Coalitionâs 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit The post Whatâs behind unchecked CVE proliferation, and what to do about it appeared first on Security Intelligence.
- Quishing: A growing threat hiding in plain sightby Josh Nadeau on October 31, 2024 at 1:00 pm
Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in The post Quishing: A growing threat hiding in plain sight appeared first on Security Intelligence.
- Cybersecurity Awareness Month: 5 new AI skills cyber pros needby Jonathan Reed on October 30, 2024 at 1:00 pm
The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant? October is Cybersecurity Awareness Month, which makes it the perfect The post Cybersecurity Awareness Month: 5 new AI skills cyber pros need appeared first on Security Intelligence.
- Why safeguarding sensitive data is so crucialby Mike Elgan on October 29, 2024 at 1:00 pm
A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other. The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction The post Why safeguarding sensitive data is so crucial appeared first on Security Intelligence.
- Addressing growing concerns about cybersecurity in manufacturingby Jonathan Reed on October 25, 2024 at 1:00 pm
Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, theyâve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.
- 3 proven use cases for AI in preventative cybersecurityby Charles Owen-Jackson on October 24, 2024 at 1:00 pm
IBMâs Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million. Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance. Here are three The post 3 proven use cases for AI in preventative cybersecurity appeared first on Security Intelligence.
- AI hallucinations can pose a risk to your cybersecurityby Jennifer Gregory on October 23, 2024 at 1:00 pm
In early 2023, Googleâs Bard made headlines for a pretty big mistake, which we now call an AI hallucination. During a demo, the chatbot was asked, âWhat new discoveries from the James Webb Space Telescope can I tell my 9-year-old about?â Bard answered that JWST, which launched in December 2021, took the âvery first picturesâ The post AI hallucinations can pose a risk to your cybersecurity appeared first on Security Intelligence.
- What NISTâs post-quantum cryptography standards mean for data securityby Hannah Chong on October 22, 2024 at 3:06 pm
Data security is the cornerstone of every business operation. Today, the security of sensitive data and communication depends on traditional cryptography methods, such as the RSA algorithm. While such algorithms secure against todayâs threats, organizations must continue to look forward and begin to prepare against upcoming risk factors. The National Institute of Standards and Technology The post What NISTâs post-quantum cryptography standards mean for data security appeared first on Security Intelligence.
- Best practices on securing your AI deploymentby Anshul Garg on October 22, 2024 at 9:00 am
As organizations embrace generative AI, there are a host of benefits that they are expecting from these projectsâfrom efficiency and productivity gains to improved speed of business to more innovation in products and services. However, one factor that forms a critical part of this AI innovation is trust. Trustworthy AI relies on understanding how the The post Best practices on securing your AI deployment appeared first on Security Intelligence.
- Whatâs behind the 51% drop in ransomware attacks?by Jonathan Reed on October 18, 2024 at 1:00 pm
In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news: ransomware attacks on state and local governments have dropped by 51% in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so The post Whatâs behind the 51% drop in ransomware attacks? appeared first on Security Intelligence.