This month in digital security, scam text messages may seem like an easy attack to dodge, but they’re getting smarter. Meanwhile, chief information security officers are wearing lots of hats. And, is it really possible to ‘future proof’ anything? The World Economic Forum says the way we look at it now isn’t working.
Here’s your look at some of the most important security conversations happening this month.
Quick Briefs: Top Insights From March
3-Minute Read 🕒
What You Need to Know About Scam Text Messages in 2021
Scam calls are almost as old as the telephone. But today’s text phishing campaigns are far from quaint: they can be subtle and use personal data. From messages that say they’re coming from your bank to fake package delivery alerts, text scams are getting smarter (And, we’re working from home, so package arrival day is a big deal.) Check out threat actors’ techniques for today and how to avoid them.
3-Minute Read 🕒
How a CISO’s Executive Role Has Changed
If you’re a chief information security officer, you might have seen a lot of changes in the last few years. That’s because the role itself is changing, shifting spots in the C-suite and being involved in different decisions. Read how you can use this to your advantage to get a better spot at the table.
2-Minute Read 🕒
‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving
Risk management can sometimes feel like peering into a crystal ball; it’s hard to predict the future. But one thing’s for sure: the world of connected devices is growing, and cybersecurity experts and threat actors are leap-frogging to get ahead of one another. Take a look at why it’s important to pivot with new threats when it comes to risk management.
Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security
6-Minute Read 🕒
Developers vs. Security: Who is Responsible for Application Security?
Developers surveyed disagree on whose jobs it is to take the onus for apps. This fascinating interview with Deloitte’s Vikram Kunchala lays out why this is thorny and how workflows can be improved to make securing apps less troublesome for everyone. Ditch the blame game and organize.
5-Minute Read 🕒
Top 10 Cybersecurity Vulnerabilities of 2020
Know what to watch out for when it comes to the vulnerabilities open to attackers, now. This detailed list specifies today’s problems in Citrix applications, PHP code, Apache Struts and more. We’ve also outlined some general plans for how to prevent common vulnerabilities and put a robust patch management program in place.
5-Minute Read 🕒
The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud
Working with today’s environments often means working cloud-native. But, what does that mean? And, how can your security operations center prepare for it? IBM brings a cloud-native version of cyber range to put your teams to the test, looking at all the moving parts, whether you’re setting up a tricky (AWS) S3 storage system or want to put your current systems to the test.
Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.