Lessons learned: The Capital One breach

| | Security Awareness
Overview of the breach The Capital One breach was accomplished by a former AWS employee who took advantage of a misconfigured firewall used by Capital One to protect their AWS deployment. This ...

The Evolution of Phishing: The Spear Is Aimed at You

You can’t go a week without seeing a story about a data breach or ransomware hitting organizations. These breaches can be very costly, but they still continue to show up. Are the ...
The importance of securing 'machine identities' by Byron Acohido

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

Digital commerce has come to revolve around two types of identities: human and machine. Great effort has gone into protecting the former, and yet human identities continue to get widely abused by ...
MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which ...

Why the Cybersecurity Skills Shortage is a Real Nightmare

Unsettling Numbers If you’ve worked in the tech industry for some time or have even a passing interest in workforce trends,… The post Why the Cybersecurity Skills Shortage is a Real Nightmare ...
The road to eliminating passwords by Byron Acohido

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and ...
Beware of Account Takeover

Beware of Account Takeover

One way to verify if an email is legitimate is to look at the sender’s address, the actual sender’s address, not just the sender’s name. One tactic cyber criminals employ is using ...

Clean IT Up: Cyber Hygiene Controls Tips

October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with ...
The Increasing UK Cyber Skills Gap

The Increasing UK Cyber Skills Gap

As organisations throughout the UK embrace Cyber Security Awareness Month, Intelligencia Training looks at why businesses are continuing to battle an increasing cyber skills gap.Following an audit in 2018, the UK government ...
Is Business Email Compromise a “cyber attack?”

Is Business Email Compromise a “cyber attack?”

Just what constitutes a cyber attack? That’s the question facing a court in a case brought against insurer AIG. One of the firm’s clients was ...
Loading...