securityintelligence.com Open in urlscan Pro
2606:4700::6812:19f1  Public Scan

Submitted URL: http://securityintelligence.com/
Effective URL: https://securityintelligence.com/
Submission: On September 21 via api from IT — Scanned from IT

Form analysis 1 forms found in the DOM

GET /

<form id="search" class="search " method="GET" action="/" target="_top" tabindex="-1">
  <amp-autocomplete filter="prefix" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/suggestions.json" suggest-first="" submit-on-enter="" on="select:search.submit" tabindex="-1"
    class="i-amphtml-element i-amphtml-layout-container i-amphtml-built i-amphtml-layout" i-amphtml-layout="container" role="combobox" aria-haspopup="listbox" aria-expanded="false" aria-owns="94_AMP_content_">
    <input id="search__input" tabindex="-1" type="text" name="s" autocomplete="off" placeholder="What would you like to search for?" aria-label="Search" oninput="validateInput(this)" required="" dir="auto" aria-autocomplete="both" role="textbox"
      aria-controls="94_AMP_content_" aria-multiline="false">
    <div class="i-amphtml-autocomplete-results" role="listbox" id="94_AMP_content_" hidden=""></div>
  </amp-autocomplete>
  <button tabindex="-1" value="submit" type="submit" class="search__submit" aria-label="Click to search">
    <amp-img width="20" height="20" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"
      class="i-amphtml-element i-amphtml-layout-responsive i-amphtml-layout-size-defined i-amphtml-built i-amphtml-layout" i-amphtml-layout="responsive"><i-amphtml-sizer slot="i-amphtml-svc" style="padding-top: 100%;"></i-amphtml-sizer><img
        decoding="async" alt="Search" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" class="i-amphtml-fill-content i-amphtml-replaced-content"></amp-img>
    <span>Search</span>
  </button>
  <button tabindex="-1" value="reset" class="search__close" type="reset" aria-labelledby="search" on="tap:search.toggleClass(class='megamenu__open')" role="link">
    <amp-img width="14" height="14" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close"
      class="i-amphtml-element i-amphtml-layout-responsive i-amphtml-layout-size-defined i-amphtml-built i-amphtml-layout" i-amphtml-layout="responsive"><i-amphtml-sizer slot="i-amphtml-svc" style="padding-top: 100%;"></i-amphtml-sizer><img
        decoding="async" alt="Close" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" class="i-amphtml-fill-content i-amphtml-replaced-content"></amp-img>
  </button>
</form>

Text Content

SECURITY INTELLIGENCE

News Topics X-Force Podcast
News Topics Threat Research Podcast

Search
{{#articles}}


{{TITLE}}

{{/articles}} View All News

Application Security Artificial Intelligence CISO Cloud Security Data Protection
Endpoint
Fraud Protection Identity & Access Incident Response Mainframe Network Risk
Management
Intelligence & Analytics Security Services Threat Hunting Zero Trust
Infographic: Zero trust policy Timeline: Local Government Cyberattacks
Industries Banking & Finance Energy & Utility Government Healthcare
View All Topics
{{#articles}}


{{TITLE}}

{{/articles}} View More From X-Force

{{#articles}}


{{TITLE}}

{{/articles}} View All Episodes



News


TOPICS

All Categories Application Security Identity & Access Artificial Intelligence
Incident Response CISO Mainframe Cloud Security Mobile Security Data Protection
Network Endpoint Risk Management Fraud Protection Threat Hunting Security
Services Security Intelligence & Analytics
Industries Banking & Finance Energy & Utility Government Healthcare
X-Force Podcast


Exclusive

Adversary Services September 4, 2024


GETTING “IN TUNE” WITH AN ENTERPRISE: DETECTING INTUNE LATERAL MOVEMENT

Organizations continue to implement cloud-based services, a shift that has led
to the wider adoption of hybrid identity environments that connect on-premises
Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices
in these hybrid identity environments, Microsoft…

Read more

Latest Articles
Risk Management September 20, 2024


NEW CYBERSECURITY ADVISORY HIGHLIGHTS DEFENSE-IN-DEPTH STRATEGIES

4 min read - In 2023, the Cybersecurity and Infrastructure Security Agency
(CISA) conducted a red team operation against an FCEB (Federal Civilian
Executive Branch) organization. In July 2024, CISA released a new CSA that
detailed the findings of this assessment along with key…

Artificial Intelligence September 19, 2024


CISA CHIEF AI OFFICER FOLLOW-UP: CURRENT STATE OF THE ROLE (AND WHERE IT’S
HEADING)

4 min read - At the beginning of August, CISA announced that it had appointed
Lisa Einstein, Senior Advisor of its artificial intelligence division, as its
new chief AI officer. This announcement came following several new initiatives
in the last couple of years focused…

Healthcare September 18, 2024


CYBERSECURITY RISKS IN HEALTHCARE ARE AN ONGOING CRISIS

4 min read - While healthcare providers have been implementing technical,
administrative and physical safeguards related to patient information, they have
not been as diligent in securing their medical devices. These devices are
critical to patient care and can leave hospitals at risk for…

Risk Management September 17, 2024


CVE BACKLOG UPDATE: THE NVD STRUGGLES AS ATTACKERS CHANGE TACTICS

4 min read - In February, the number of vulnerabilities processed and enriched
by the National Institute of Standards and Technology (NIST) National
Vulnerability Database (NVD) started to slow. By May, 93.4% of new
vulnerabilities and 50.8% of known exploited vulnerabilities were still waiting…

More articles
NEWS

September 16, 2024

The restaurant industry has been hit with a rising number of cyberattacks...

Learn More Arrow right
POPULAR
News August 19, 2024


NATIONAL PUBLIC DATA BREACH PUBLISHES PRIVATE DATA OF 2.9B US CITIZENS

3 min read - Billions of people’s data was published on the dark web around
April 8, 2024 — from a single breach of National Public Data. However, many of
the victims are still unaware of their exposure because they have yet to
receive…

News September 16, 2024


THE RISING THREAT OF CYBERATTACKS IN THE RESTAURANT INDUSTRY

2 min read - The restaurant industry has been hit with a rising number of
cyberattacks in the last two years, with major fast-food chains as the primary
targets. Here’s a summary of the kinds of attacks to strike this industry and
what happened…

Artificial Intelligence September 10, 2024


CHATGPT 4 CAN EXPLOIT 87% OF ONE-DAY VULNERABILITIES: IS IT REALLY THAT
IMPRESSIVE?

2 min read - After reading about the recent cybersecurity research by Richard
Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially
impressed that ChatGPT 4 can exploit the vast majority of one-day
vulnerabilities, I started thinking about what the…

Latest Podcast
Season 3 |Episode 7
Cyber leaders: Stop being your own worst career enemy. Here’s how.
How do you transition from security SME to security leader? Learn how to
supercharge your cybersecurity career on this episode of Into the Breach with
special guest Brian Donovan, author of “Leadership is Changing the Game: The
transition from technical expert to leader.”
Now playing
Play podcast pause podcast 36:18

ALL Episodes Subscribe SoundCloud Spotify Apple Podcasts
Subscribe
Soundcloud Spotify Artboard 1 Apple Podcasts
Latest Articles
Latest Articles
News September 16, 2024


THE RISING THREAT OF CYBERATTACKS IN THE RESTAURANT INDUSTRY

2 min read - The restaurant industry has been hit with a rising number of
cyberattacks in the last two years, with major fast-food chains as the primary
targets. Here’s a summary of the kinds of attacks to strike this industry and
what happened…

Risk Management September 13, 2024


WHAT CAN BUSINESSES LEARN FROM THE RISE OF CYBER ESPIONAGE?

4 min read - It’s not just government organizations that need to worry about
cyber espionage campaigns — the entire business world is also a target.
Multipolarity has been a defining trend in geopolitics in recent years.
Rivalries between the world’s great powers continue…

Artificial Intelligence September 12, 2024


HOW I GOT STARTED: AI SECURITY EXECUTIVE

3 min read - Artificial intelligence and machine learning are becoming
increasingly crucial to cybersecurity systems. Organizations need professionals
with a strong background that mixes AI/ML knowledge with cybersecurity skills,
bringing on board people like Nicole Carignan, Vice President of Strategic Cyber
AI at…

More articles
Choose a Category
CISO Zero Trust Cloud Security Data Protection Identity & Access X-Force
Choose a Category CISO Zero Trust Cloud Security Data Protection Identity &
Access X-Force
Sponsored


IBM SECURITY X-FORCE THREAT INTELLIGENCE INDEX: EXPLORE THE TOP THREATS OF 2023.

In 2023, abusing valid credentials became the most common entry point into
victim environments with a 71% increase in volume year over year. Learn more.

Read the report

Featured by topic
News August 19, 2024


NATIONAL PUBLIC DATA BREACH PUBLISHES PRIVATE DATA OF 2.9B US CITIZENS

Billions of people’s data was published on the dark web around April 8, 2024 —
from…

News August 9, 2024


TIME’S UP: KASPERSKY IS FINALLY LEAVING THE U.S.

The shift started in 2017 with a Department of Homeland Security (DHS) ban on
using Kaspersky…

News August 5, 2024


HACKER GROUP FIN7 IS SELLING EDR EVASION TOOLS TO OTHER CYBER CRIMINALS

Entrepreneurship is rampant these days — even across the dark web. While the
paths of cyber…

Risk Management August 15, 2024


CISOS LIST HUMAN ERROR AS THEIR TOP CYBERSECURITY RISK

With cybersecurity, the focus often is on technology — specifically, how cyber
criminals use it to…

News May 24, 2024


CHANGE HEALTHCARE DISCLOSES $22M RANSOMWARE PAYMENT

UnitedHealth Group CEO Andrew Witty found himself answering questions in front
of Congress on May 1…

Data Protection August 13, 2024


COST OF A DATA BREACH 2024: FINANCIAL INDUSTRY

According to the IBM Cost of a Data Breach 2024 report, the average global
breach cost…

Artificial Intelligence February 1, 2024


AUDIO-JACKING: USING GENERATIVE AI TO DISTORT LIVE AUDIO TRANSACTIONS

While the evolution of LLMs mark a new era of AI, we must be mindful that…

Data Protection August 6, 2024


COST OF A DATA BREACH: THE HEALTHCARE INDUSTRY

Cyberattacks grow every year in sophistication and frequency, and the cost of
data breaches continues to…


















More topics


TOPIC UPDATES

Get email updates and stay ahead of the latest threats to the security
landscape, thought leadership and research.
Subscribe today

Analysis and insights from hundreds of the brightest minds in the cybersecurity
industry to help you prove compliance, grow business and stop threats.

Cybersecurity News By Topic By Industry Exclusive Series X-Force Podcast Events
Contact About Us
Follow us on social
© 2024 IBM Contact Privacy Terms of use Accessibility Cookie Preferences
Sponsored by si-icon-eightbarfeature

IBM web domains

ibm.com, ibm.dev, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net,
merge.com, micromedex.com, mobilebusinessinsights.com, promontory.com,
proveit.com, ptech.org, resource.com, s81c.com, securityintelligence.com,
skillsbuild.org, softlayer.com, storagecommunity.org, strongloop.com,
teacheradvisor.org, think-exchange.com, thoughtsoncloud.com, trusteer.com,
truven.com, truvenhealth.com, alphaevents.webcasts.com, betaevents.webcasts.com,
ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net,
ibmcloud.com, redhat.com, galasa.dev, blueworkslive.com, swiss-quantum.ch,
altoromutual.com, blueworkslive.cn, blueworkslive.com, cloudant.com, ibm.ie,
ibm.fr, ibm.com.br, ibm.co, ibm.ca, silverpop.com,
community.watsonanalytics.com, eclinicalos.com, datapower.com,
ibmmarketingcloud.com, thinkblogdach.com, truqua.com, my-invenio.com,
skills.yourlearning.ibm.com, bluewolf.com, asperasoft.com, instana.com,
taos.com, envizi.com, carbondesignsystem.com
About cookies on this site Our websites require some cookies to function
properly (required). In addition, other cookies may be used with your consent to
analyze site usage, improve the user experience and for advertising. For more
information, please review your cookie preferences  options. By visiting our
website, you agree to our processing of information as described in
IBM’sprivacy statement.  To provide a smooth navigation, your cookie preferences
will be shared across the IBM web domains listed here.

Accept all Required only

Cookie Preferences