CINXE.COM
Topics - Security Intelligence
<!doctype html> <html lang="en-US"> <head> <meta charset="UTF-8"> <link rel="shortcut icon" type="image/x-icon" href="https://securityintelligence.com/wp-content/themes/sapphire/images/favicon.ico" sizes="32x32" /> <meta name="viewport" content="width=device-width,minimum-scale=1,initial-scale=1,maximum-scale=1"> <!-- DEFINITIONS --> <title>Topics - Security Intelligence</title> <!--<meta name="description" content="">--> <!-- THEME COLOR --> <meta name="theme-color" content="#000000"> <!-- REFERRER POLICY --> <meta name="referrer" content="no-referrer-when-downgrade"> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <!-- LANGUAGE/TRANSLATIONS --> <!-- AMP SCRIPTS --> <script async src="https://cdn.ampproject.org/v0.js"></script> <script async custom-element="amp-list" src="https://cdn.ampproject.org/v0/amp-list-0.1.js"></script> <script async custom-template="amp-mustache" src="https://cdn.ampproject.org/v0/amp-mustache-0.2.js"></script> <script async custom-element="amp-accordion" src="https://cdn.ampproject.org/v0/amp-accordion-0.1.js"></script> <script custom-element="amp-animation" src="https://cdn.ampproject.org/v0/amp-animation-0.1.js" async></script> <script custom-element="amp-position-observer" src="https://cdn.ampproject.org/v0/amp-position-observer-0.1.js" async></script> <script async custom-element="amp-bind" src="https://cdn.ampproject.org/v0/amp-bind-0.1.js"></script> <script async custom-element="amp-autocomplete" src="https://cdn.ampproject.org/v0/amp-autocomplete-0.1.js"></script> <script async custom-element="amp-social-share" src="https://cdn.ampproject.org/v0/amp-social-share-0.1.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.35.0/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/next/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.11.0/card.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.11.0/image.min.js"></script> <script async custom-element="amp-carousel" src="https://cdn.ampproject.org/v0/amp-carousel-0.2.js"></script> <script async custom-element="amp-base-carousel" src="https://cdn.ampproject.org/v0/amp-base-carousel-0.1.js"></script> <!-- FONTS --> <!-- <link rel="preload" href="https://fonts.googleapis.com/css?family=IBM+Plex+Sans+Condensed:300,400,500|IBM+Plex+Sans:300,400,500&display=swap" rel="stylesheet"> --> <!-- ANALYTICS --> <script> // Digital Registry digitalData = { "page": { "category": { "primaryCategory": "Intelligence & Analytics" }, "pageInfo": { "language": "en-US", "country": "US", "version": "custom", "effectiveDate": "2022-12-21", "publishDate": "2022-12-21", "optimizely": { "enabled": "false", }, "ibm": { "contentDelivery": "WordPress", "contentProducer": "Hand coded", "owner": "", "siteID": "SECURITYINTELLIGENCE", "type": "Posts", } } } } // Custom Click Tagging // Collect and send clicks not detectable by ida_stats.js function sendClickTag(section, feature, destination) { console.log(section + " " + feature) var config = { type: 'ELEMENT', primaryCategory: section, // e_a1 - Element Category eventName: feature, // e_a2 - Element Name targetURL: destination, // e_a7 - Element Attribute: ibmEvTarget }; ibmStats.event(config); } // Custom Click Tagging // Collect and send clicks not detectable by ida_stats.js // function sendClickConversion(feature, title) { // var config = { // type : 'pageclick', // primaryCategory : 'PAGE CLICK', // eventCategoryGroup : "TIMELINE - SECURITY INTELLIGENCE", // eventName : feature, // targetTitle : title // }; // ibmStats.event(config); // } // Custom Link Event // Add clicktag event on every link inside the element function tagAllLinks(element, section, feature) { var element = document.querySelectorAll(element); if (typeof(element) != 'undefined' && element != null) { for (var i = 0; i < element.length; i++) { var elements = element[i].querySelectorAll("a:not(.btn)"); for (var o = 0; o < elements.length; o++) { if (elements[o].getAttribute('listener') !== 'true') { var destination = elements[o].getAttribute('href'); elements[o].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag(section, feature, this.getAttribute('href')); this.setAttribute('listener', 'false'); } }, false); elements[o].setAttribute('listener', 'true'); } } } } } window.onload = function() { // Call to action click tag var ctaButton = document.querySelectorAll(".single__content a"); if (typeof(ctaButton) != 'undefined' && ctaButton != null && ctaButton.length !== 0) { for (var i = 0; i < ctaButton.length; i++) { ctaButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag("BODY", "CALL TO ACTION"); this.setAttribute('listener', 'false'); } }, false); ctaButton[i].setAttribute('listener', 'true'); } } // Read more click tag var readButton = document.querySelectorAll(".continue-reading button"); if (typeof(readButton) != 'undefined' && readButton != null && readButton.length !== 0) { for (var i = 0; i < readButton.length; i++) { readButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag("BODY", "READ-MORE"); this.setAttribute('listener', 'false'); } }, false); readButton[i].setAttribute('listener', 'true'); } } // LISTICLES tag - Arrows //left arrow var leftArrow = document.getElementById("prev"); if (typeof(leftArrow) != 'undefined' && leftArrow != null) { //for (var i = 0; i < leftArrow.length; i++) { leftArrow.addEventListener('click', function() { if (this.getAttribute('listener') === 'true' && leftArrow.id == "prev") { sendClickTag("BODY", "LISTICLE-LEFT-ARROW"); this.setAttribute('listener', 'false'); } }, false); leftArrow.setAttribute('listener', 'true'); //} } //right arrow var rightArrow = document.getElementById("next"); if (typeof(rightArrow) != 'undefined' && rightArrow != null) { //for (var i = 0; i < rightArrow.length; i++) { rightArrow.addEventListener('click', function() { if (this.getAttribute('listener') === 'true' && rightArrow.id == "next") { sendClickTag("BODY", "LISTICLE-RIGHT-ARROW"); this.setAttribute('listener', 'false'); } }, false); rightArrow.setAttribute('listener', 'true'); //} } // LISTICLES tag - numbers var listicleTopButton = document.querySelectorAll(".listicle__pagination__numbers"); if (typeof(listicleTopButton) != 'undefined' && listicleTopButton != null && listicleTopButton.length !== 0) { for (var i = 0; i < listicleTopButton.length; i++) { var currentSlide = 1; listicleTopButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { currentSlide++; var total = i; // var clickedSlides=currentSlide/2; // console.log(clickedSlides.toFixed()); //I'm removing 2 because 2 arrows on the listicle are unclickable, but present on the DOM // clickableArrows = i-2; // clickableArrows = i-1; // I'm deviding by 2 because on each slide we have 2 arrows, so we were actually sendind the double of tags // clickableArrows= clickableArrows/2; // console.log(i); // clickableArrows.toFixed(); if (currentSlide <= total) { sendClickTag("PAGE CLICK", "LISTICLE-NAVIGATION-SLIDE" + currentSlide); this.setAttribute('listener', 'false'); } else { sendClickTag("PAGE CLICK", "LISTICLE-NAVIGATION-END"); this.setAttribute('listener', 'false'); } } }, false); listicleTopButton[i].setAttribute('listener', 'true'); } } // // Timeline box click tag // var boxButton = document.querySelectorAll(".timeline__content .box"); // if (typeof(boxButton) != 'undefined' && boxButton != null && boxButton.length !== 0) { // for (var i = 0; i < boxButton.length; i++) { // boxButton[i].addEventListener('click', function(){ // if (this.getAttribute('listener') === 'true') { // sendClickConversion("DETAILED VIEW", this.getAttribute('data-title')); // this.setAttribute('listener', 'false'); // } // }, false); // boxButton[i].setAttribute('listener', 'true'); // } // } }; </script> <!-- COREMETRICS --> <script defer src="https://1.www.s81c.com/common/stats/ida_stats.js" type="text/javascript"></script> <!-- AMP DEFAULT CSS --> <style amp-boilerplate> body { -webkit-animation: -amp-start 8s steps(1, end) 0s 1 normal both; -moz-animation: -amp-start 8s steps(1, end) 0s 1 normal both; -ms-animation: -amp-start 8s steps(1, end) 0s 1 normal both; animation: -amp-start 8s steps(1, end) 0s 1 normal both } @-webkit-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-moz-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-ms-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-o-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } </style><noscript> <style amp-boilerplate> body { -webkit-animation: none; -moz-animation: none; -ms-animation: none; animation: none } </style> </noscript> <link rel="stylesheet" href="https://securityintelligence.com/wp-content/themes/sapphire/minifications/modules.css?v=1715191630"> <!-- CUSTOM CSS --> <meta name='robots' content='max-image-preview:large' /> <link rel="alternate" type="application/rss+xml" title="Security Intelligence » Topics Category Feed" href="https://securityintelligence.com/category/topics/feed/" /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/securityintelligence.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://securityintelligence.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='taxonomy-image-plugin-public-css' href='https://securityintelligence.com/wp-content/plugins/taxonomy-images/css/style.css?ver=0.9.6' type='text/css' media='screen' /> <script type="text/javascript" src="https://securityintelligence.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://securityintelligence.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://securityintelligence.com/wp-content/themes/sapphire/app/javascript/si-theme-cookie.js?ver=6.6.2" id="si-cookie-consent-js"></script> <link rel="https://api.w.org/" href="https://securityintelligence.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://securityintelligence.com/wp-json/wp/v2/categories/310" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://securityintelligence.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.6.2" /> <link rel="icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb-80x80.png" sizes="32x32" /> <link rel="icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" /> <meta name="msapplication-TileImage" content="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" /> <style amp-custom>@import url('https://fonts.googleapis.com/css?family=IBM+Plex+Sans:200,300,400,500,600');@import url('https://fonts.googleapis.com/css?family=IBM+Plex+Sans+Condensed:300,400,500,600,700');@import url('https://fonts.googleapis.com/css2?family=IBM+Plex+Serif&display=swap')</style><link rel="stylesheet" href="https://securityintelligence.com/wp-content/themes/sapphire/minifications/category.css"><link rel="stylesheet" href="https://securityintelligence.com/wp-content/themes/sapphire/minifications/topics.css?v=1699993142"> <!-- YOAST SEO --> <!-- This site is optimized with the Yoast SEO Premium plugin v13.1 - https://yoast.com/wordpress/plugins/seo/ --> <meta name="robots" content="max-snippet:-1, max-image-preview:large, max-video-preview:-1"/> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="object" /> <meta property="og:title" content="Topics - Security Intelligence" /> <meta property="og:site_name" content="Security Intelligence" /> <meta property="fb:app_id" content="3703311399714818" /> <meta property="og:image" content="https://securityintelligence.com/wp-content/uploads/2019/07/SecurityIntelligence-1200x675.jpg" /> <meta property="og:image:secure_url" content="https://securityintelligence.com/wp-content/uploads/2019/07/SecurityIntelligence-1200x675.jpg" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="675" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:title" content="Topics - Security Intelligence" /> <meta name="twitter:image" content="https://securityintelligence.com/wp-content/uploads/2019/07/SecurityIntelligence-1200x675.jpg" /> <script type='application/ld+json' class='yoast-schema-graph yoast-schema-graph--main'>{"@context":"https://schema.org","@graph":[{"@type":"WebSite","@id":"https://securityintelligence.com/#website","url":"https://securityintelligence.com/","name":"Security Intelligence","inLanguage":"en-US","description":"Analysis and Insight for Information Security Professionals","potentialAction":{"@type":"SearchAction","target":"https://securityintelligence.com/?s={search_term_string}","query-input":"required name=search_term_string"}},{"@type":"CollectionPage","@id":"https://securityintelligence.com/category/topics/#webpage","url":"https://securityintelligence.com/category/topics/","name":"Topics - Security Intelligence","isPartOf":{"@id":"https://securityintelligence.com/#website"},"inLanguage":"en-US"}]}</script> <!-- / Yoast SEO Premium plugin. --> </head> <body class="category-page-si" > <nav id="navigation" class="navigation navigation--homepage " aria-label="Security Intelligence"> <div class="container"> <div class="row"> <!-- LOGO --> <div class="navigation__brand"> <a href="https://securityintelligence.com" title="Security Intelligence" tabindex="1"> <amp-img width="280" height="31" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/logo-white.svg" alt="Security Intelligence Logo"> <div fallback> <h6>Security Intelligence</h6> </div> </amp-img> </a> </div> <!-- DESKTOP MENU - HOVER --> <div class="navigation__menu" onmouseleave="delete localStorage['megamenu-status']"> <a tabindex="2" id="nav-news" href="/news/" class="navigation__button " data-menu="megamenu__news" onclick="localStorage['megamenu-status'] = 'first-interaction';">News</a> <a tabindex="4" id="nav-topics" href="/category/topics/" class="navigation__button active" data-menu="megamenu__topics" onclick="localStorage['megamenu-status'] = 'first-interaction';">Topics</a> <a tabindex="5" id="nav-x-force" href="/x-force/" class="navigation__button " data-menu="megamenu__threat" onclick="localStorage['megamenu-status'] = 'first-interaction';">X-Force</a> <a tabindex="6" id="nav-media" href="/media/" class="navigation__button " data-menu="megamenu__podcast" onclick="localStorage['megamenu-status'] = 'first-interaction';">Podcast</a> <button aria-label="search Button" class="navigation__search" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="-1" type="button"> <amp-img tabindex="7" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Click to open the search bar"></amp-img> </button> </div> <!-- TABLET MENU - TAP/CLICK --> <div id="search-tablet" class="navigation__menu navigation__menu--tablet" tabindex="-1"> <button type="button" class="navigation__button " data-menu="megamenu__news">News</button> <button type="button" class="navigation__button active" data-menu="megamenu__topics" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.show, megamenu__industries.hide, megamenu__threat.hide, megamenu__podcast.hide, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Topics</button> <button type="button" class="navigation__button " data-menu="megamenu__threat" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.hide, megamenu__industries.hide, megamenu__threat.show, megamenu__podcast.hide, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Threat Research</button> <button type="button" class="navigation__button " data-menu="megamenu__podcast" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.hide, megamenu__industries.hide, megamenu__threat.hide, megamenu__podcast.show, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Podcast</button> <button type="button" aria-labelledby="search-tablet" class="navigation__search" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="0"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> </button> </div> <!-- SEARCH --> <form id="search" class="search " method="GET" action="/" target="_top" tabindex="-1"> <amp-autocomplete filter="prefix" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/suggestions.json" suggest-first submit-on-enter on="select:search.submit" tabindex="-1"> <input id="search__input" tabindex="-1" type="text" name="s" autocomplete="on" placeholder="What would you like to search for?" aria-label="Search" oninput="validateInput(this)" required> </amp-autocomplete> <button tabindex="-1" value="submit" type="submit" class="search__submit" aria-label="Click to search"> <amp-img width="20" height="20" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> <span>Search</span> </button> <button tabindex="-1" value="reset" class="search__close" type="reset" aria-labelledby="search" on="tap:search.toggleClass(class='megamenu__open')" role="link"> <amp-img width="14" height="14" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close"></amp-img> </button> </form> <!-- MEGAMENU --> <div id="navigation__mega"> <!-- NEWS --> <section id="megamenu__news" class="megamenu" data-menu="nav-news" on="tap:megamenu__news.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&type=ibm_news" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/news/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/news.svg" alt="News"></amp-img> <span>View All News</span> </a> </div> </template> </amp-list> </section> <!-- SERIES --> <!-- TOPICS --> <section id="megamenu__topics" class="megamenu" data-menu="nav-topics" on="tap: megamenu__topics.show, megamenu__mask.show" role="link" tabindex="0"> <div class="row"> <!-- LISTS --> <div class="megamenu__list"> <a href="/category/app-security/">Application Security</a> <a href="/category/artificial-intelligence/">Artificial Intelligence</a> <a href="/category/ciso-corner/">CISO</a> <a href="/category/cloud-protection/">Cloud Security</a> <a href="/category/data-protection/">Data Protection</a> <a href="/category/endpoint/">Endpoint</a> </div> <div class="megamenu__list"> <a href="/category/fraud-protection/">Fraud Protection</a> <a href="/category/identity-access/">Identity & Access</a> <a href="/category/incident-response/">Incident Response</a> <a href="/category/mainframe/">Mainframe</a> <a href="/category/network/">Network</a> <a href="/category/risk-management/">Risk Management</a> </div> <div class="megamenu__list"> <a href="/category/security-intelligence-analytics/">Intelligence & Analytics</a> <a href="/category/security-services/">Security Services</a> <a href="/category/threat-hunting/">Threat Hunting</a> <a href="/category/topics/zero-trust/">Zero Trust</a> <a href="/infographic-zero-trust-policy/">Infographic: Zero trust policy</a> <a href="/timeline/state-local-government-cyberattacks/">Timeline: Local Government Cyberattacks</a> </div> <div class="megamenu__list"> <span>Industries</span> <a href="/category/banking-financial-services-industry/">Banking & Finance</a> <a href="/category/energy-utility-industry/">Energy & Utility</a> <a href="/category/government/">Government</a> <a href="/category/health-care-industry/">Healthcare</a> </div> <!-- VIEW MORE --> <a href="/category/topics/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/topics.svg" alt="Topics"></amp-img> <span>View All Topics</span> </a> </div> </section> <!-- THREAT RESEARCH --> <section id="megamenu__threat" class="megamenu" data-menu="nav-x-force" on="tap:megamenu__threat.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&category=x-force" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/x-force/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/threat-research.svg" alt="Threat Research"></amp-img> <span>View More From X-Force</span> </a> </div> </template> </amp-list> </section> <!-- PODCAST --> <section id="megamenu__podcast" class="megamenu" data-menu="nav-media" on="tap:megamenu__podcast.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&type=ibm_media" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/media/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/podcast.svg" alt="Podcast"></amp-img> <span>View All Episodes</span> </a> </div> </template> </amp-list> </section> </div> <!-- MASK --> <div id="megamenu__mask" class="navigation__mask " hidden></div> <!-- MEGAMENU SCRIPTS --> <script type="text/javascript"> function validateInput(inputElement) { // Regular expression to allow only letters (both uppercase and lowercase) and numbers var regex = /^[A-Za-z0-9 ]*$/; // Get the current value of the input field var inputValue = inputElement.value; // Check if the input value matches the allowed pattern if (!regex.test(inputValue)) { // If the input contains special characters, remove them inputElement.value = inputValue.replace(/[^A-Za-z0-9 ]/g, ''); } } // DESKTOP MENU LINKS - HOVER ACTION var elementList = document.querySelectorAll('.navigation__menu .navigation__button'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('mouseenter', function() { if (localStorage['megamenu-status'] !== 'first-interaction') { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); menu_elements.click(); mega.classList.add('amp-open'); menu_elements.classList.add('amp-open'); mask.classList.add('amp-open'); } }); elementList[i].addEventListener('mouseleave', function() { if (localStorage['megamenu-status'] !== 'first-interaction') { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); mega.classList.remove('amp-open'); menu_elements.classList.remove('amp-open'); mask.classList.remove('amp-open'); } }); } // TABLET MENU LINKS - CLICK ACTION var elementList = document.querySelectorAll('.navigation__menu--tablet .navigation__button'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('click', function() { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); menu_elements.click(); mega.classList.add('amp-open'); menu_elements.classList.add('amp-open'); mask.classList.add('amp-open'); }); } // OPPENED MEGAMENU - HOVER ACTION var elementList = document.querySelectorAll('.megamenu'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('mouseenter', function() { var mega = document.getElementById("navigation__mega"); var nav_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); this.classList.add('amp-open'); mega.classList.add('amp-open'); mask.classList.add('amp-open'); nav_elements.classList.add('amp-open'); }); elementList[i].addEventListener('mouseleave', function() { var mega = document.getElementById("navigation__mega"); var nav_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); this.classList.remove('amp-open'); mega.classList.remove('amp-open'); mask.classList.remove('amp-open'); nav_elements.classList.remove('amp-open'); }); } </script> <!-- MOBILE ICON --> <button type="button" aria-labelledby="search-tablet" class="search__mobile__icon" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="0"> <amp-img width="18" height="18" layout="fixed" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> </button> <div class="navigation__mobile-icon" on="tap:navigation__mobile.toggleVisibility, navigation__hamburguer.toggleVisibility, navigation__close.toggleVisibility " role="link" tabindex="0"> <amp-img id="navigation__hamburguer" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/hamburguer.svg" alt="Menu"></amp-img> <amp-img id="navigation__close" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close" hidden></amp-img> </div> <!-- MOBILE LIST --> <section id="navigation__mobile" class="navigation__mobile-list" hidden> <div class="container"> <a href="/news/">News</a> <!-- ACCORDIONS --> <amp-accordion disable-session-states> <!-- TOPICS --> <section class="navigation__accordion"> <h2>Topics</h2> <div class="navigation__accordion-content"> <div class="row"> <a href="/category/topics/">All Categories</a> <a href="/category/app-security/">Application Security</a> <a href="/category/identity-access/">Identity & Access</a> <a href="/category/artificial-intelligence/">Artificial Intelligence</a> <a href="/category/incident-response/">Incident Response</a> <a href="/category/ciso-corner/">CISO</a> <a href="/category/mainframe/">Mainframe</a> <a href="/category/cloud-protection/">Cloud Security</a> <a href="/category/mobile-security-podcasts/">Mobile Security</a> <a href="/category/data-protection/">Data Protection</a> <a href="/category/network/">Network</a> <a href="/category/endpoint/">Endpoint</a> <a href="/category/risk-management/">Risk Management</a> <a href="/category/fraud-protection/">Fraud Protection</a> <a href="/category/threat-hunting/">Threat Hunting</a> <a href="/category/security-services/">Security Services</a> <a href="/category/security-intelligence-analytics/">Security Intelligence & Analytics</a> </div> <div class="row"> <span>Industries</span> <a href="/category/industries/banking-financial-services-industry/">Banking & Finance</a> <a href="/category/energy-utility-industry/">Energy & Utility</a> <a href="/category/government/">Government</a> <a href="/category/health-care-industry/">Healthcare</a> </div> </div> </section> </amp-accordion> <a href="/x-force/">X-Force</a> <a href="/media/">Podcast</a> </section> </div> </div> </nav> <!-- BACK TO TOP --> <div class="scroll-to-top "> <!-- TOP VIEWER TRIGGER --> <div id="top-viewer" class="scroll-to-top__viewer"></div> <!-- BUTTON --> <div class="sticky" style="height: 100%;"> <button id="scrollToTopButton" on="tap:top-viewer.scrollTo(duration=200, position=bottom)" class="tap_target scroll-to-top__button--topics"> <div class="scroll-to-top__button"> <amp-img width="12" height="16" layout="fixed" alt="Back-to-top" src="https://securityintelligence.com/wp-content/themes/sapphire/images/scroll-to-top.svg"></amp-img> </div> </button> </div> <!-- SCROLL SHOW/HIDE ANIMATION --> <amp-animation id="showAnim" layout="nodisplay"> <script type="application/json"> { "duration": "200ms", "fill": "both", "iterations": "1", "direction": "alternate", "animations": [{ "selector": "#scrollToTopButton", "keyframes": [{ "opacity": "1", "visibility": "visible" }] }] } </script> </amp-animation> <amp-animation id="hideAnim" layout="nodisplay"> <script type="application/json"> { "duration": "200ms", "fill": "both", "iterations": "1", "direction": "alternate", "animations": [{ "selector": "#scrollToTopButton", "keyframes": [{ "opacity": "0", "visibility": "hidden" }] }] } </script> </amp-animation> </div> <!-- CHECK PAGE POSITION --> <amp-position-observer target="top-viewer" intersection-ratios="0" on="enter:hideAnim.start; exit:showAnim.start" layout="nodisplay"></amp-position-observer> <!-- TOPICS --> <section class="category-hero"> <!-- BACKGROUND --> <div class="category-hero__background" style="background-image: url('https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg');"></div> <div class="container"> <div class="row"> <!-- BREADCRUMBS --> <div class="category-hero__breadcrumbs"> <a href="/">Home</a> <span>/</span> <a href="/category/topics">Topics</a> </div> <!-- EXCLUSIVE --> <div class="category-hero__label"> <div class="category-hero__name">Trending</div> <span>|</span> <div class="category-hero__category">Risk Management</div> </div> <!-- TITLE --> <a href="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" class="category-hero__exclusive"> <h1>What does resilience in the cyber world look like in 2025 and beyond?</h1> </a> <a href="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" title="What does resilience in the cyber world look like in 2025 and beyond?" class="category-hero__read">Read the story</a> <!-- FEATURED --> <section class="featured"> <h2 class="featured__name">Featured</h2> <div class="items items--cards"> <div class="row"> <article class="items__article"> <a href="https://securityintelligence.com/articles/airplane-cybersecurity-past-present-future/" class="items__link"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Pilot-Switching-a-Control-in-the-Cockpit-of-a-Commercial-Aeroplane-630x330.jpeg" alt="In the cockpit of a commercial airplane a pilot is switching on controls"></amp-img> </div> <div class="items__labels"> <div class="items__category">Risk Management</div> <div class="items__date-and-time">2 days ago</div> </div> <h3 class="items__title">Airplane cybersecurity: Past, present, future</h3> </a> </article> <article class="items__article"> <a href="https://securityintelligence.com/articles/protecting-digital-assets-non-human-identity-attacks/" class="items__link"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Backdrop-with-icons-and-an-electronic-circuit-board.-Fingerprint-identification-is-used-to-get-access-to-a-secure-computer-network-and-digital-system.-Biometrics-technology-for-cyb-630x330.jpeg" alt="Closeup on a blue circuit board with a fingerprint inside of a dotted square"></amp-img> </div> <div class="items__labels"> <div class="items__category">Risk Management</div> <div class="items__date-and-time">3 days ago</div> </div> <h3 class="items__title">Protecting your digital assets from non-human identity attacks</h3> </a> </article> </div> </div> </section> </div> </div> </section> <main id="topics-content"> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Application Security</div> <a title="Application Security" href="https://securityintelligence.com/category/topics/app-security/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/pixpirate-brazilian-financial-malware/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/smartphone-malware-concept.-3d-render-630x330.jpeg" alt="A smartphone displaying a full red screen with malware warning set on a blue circuit board"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 13, 2024</div> </div> <h3 class="items__title"> PixPirate: The Brazilian financial malware you can’t see </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/identity-and-access-management-evolution/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/03/Banner-of-woman-using-laptop-with-VR-interface-on-keyboard-1-630x330.jpeg" alt="Closeup on a hand resting on a keyboard & a projected login prompt floating above in green"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 5, 2024</div> </div> <h3 class="items__title"> From federation to fabric: IAM’s evolution </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/using-generative-ai-distort-live-audio-transactions/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/Young-Hacker-Working-Alone-Hacking-Corporate-Data-Servers-From-His-Underground-Hideout.-Hacktivist-Organizes-a-Massive-Data-Breach-Cyber-Attack-Hiding-His-Identity-Behind-Multipl-630x330.jpeg" alt="A man sitting at a desk with multiple monitors displaying audio waves wearing headphones with his back to us"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Feb 1, 2024</div> </div> <h3 class="items__title"> Audio-jacking: Using generative AI to distort live audio transactions </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/mapping-attacks-generative-ai-business-impact/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/Young-woman-working-in-the-night-office.-System-engineering.-Digital-transformation-630x330.jpeg" alt="Young woman working in an office at night on a laptop and clear digital display board"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 30, 2024</div> </div> <h3 class="items__title"> Mapping attacks on generative AI to business impact </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/12/Transparency-smart-phone-with-ransomware-attack-warning-sign-630x330.jpeg" alt="A person in a blue jacket holding a smartphone face out with red warning on screen"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Dec 19, 2023</div> </div> <h3 class="items__title"> Web injections are back on the rise: 40+ banks affected by new malware campaign </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/gozi-strikes-again-targeting-banks-cryptocurrency-and-more/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/08/Detecting-of-a-malware.-Virus-system-hack-cyber-attack-malware-concept.-3d-rendering-630x330.jpeg" alt="Malware detection warning on a computer screen"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 17, 2023</div> </div> <h3 class="items__title"> Gozi strikes again, targeting banks, cryptocurrency and more </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/app-security.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/app-security//?mobile" class="link">More on Application Security</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Artificial Intelligence</div> <a title="Artificial Intelligence" href="https://securityintelligence.com/category/topics/artificial-intelligence/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/autonomous-security-for-cloud-in-aws/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Side-view-of-focused-male-developer-coding-on-computer-while-sitting-at-working-at-office-630x330.jpeg" alt="Side view of a male sitting at a desk working on a computer in an office"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 14, 2024</div> </div> <h3 class="items__title"> Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/cybersecurity-awareness-month-new-ai-skills-needed/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/Female-teacher-addressing-university-students-in-a-classroom-630x330.jpeg" alt="Female teacher heading a lesson in a large full classroom"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 30, 2024</div> </div> <h3 class="items__title"> Cybersecurity Awareness Month: 5 new AI skills cyber pros need </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/3-proven-use-cases-for-ai-preventative-cybersecurity/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/AI-robot-using-cyber-security-to-protect-information-privacy-630x330.jpeg" alt="Backside of an AI robot standing holding a tablet displaying a security shield"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 24, 2024</div> </div> <h3 class="items__title"> 3 proven use cases for AI in preventative cybersecurity </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/articles/ai-hallucinations-pose-risk-cybersecurity/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/Glowing-red-and-yellow-error-message-overlaid-on-programming-language-source-code-text-with-many-warning-icons.-Close-up-defocused-and-pixelated-composition-630x330.jpeg" alt="Glowing red and yellow error message overlaid on programming language source code text, with many warning icons"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 23, 2024</div> </div> <h3 class="items__title"> <span>Trending in Artificial Intelligence</span> AI hallucinations can pose a risk to your cybersecurity </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/artificial-intelligence.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/artificial-intelligence//?mobile" class="link">More on Artificial Intelligence</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">CISO</div> <a title="CISO" href="https://securityintelligence.com/category/topics/ciso-corner/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/overheard-at-rsa/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Audience-at-conference-630x330.jpeg" alt="Diverse audience sitting at business conference"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 14, 2024</div> </div> <h3 class="items__title"> Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/why-security-orchestration-automation-and-response-soar-is-fundamental-to-a-security-platform/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2020/05/internal_why-security-orchestration-automation-and-response-soar-is-fundamental-to-a-security-platform-630x330.jpg" alt="An employee uses a security platform while working from home."></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Apr 9, 2024</div> </div> <h3 class="items__title"> Why security orchestration, automation and response (SOAR) is fundamental to a security platform </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/ciso-role-evolution/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/04/Multiethnic-Robotics-Engineer-Talking-to-Project-Manager-Discussing-Robot-Dog-Concept-in-High-Tech-Research-and-Development-Facility.-Professional-Industrial-Scientists-Working-in-630x330.jpeg" alt="A female and male professional standing in an office having a discussion while jointly holding a tablet"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Apr 2, 2024</div> </div> <h3 class="items__title"> The evolution of a CISO: How the role has changed </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/boardroom-cyber-expertise-scrutiny/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/Co-workers-having-meeting-with-laptop-in-conference-room-630x330.jpeg" alt="Business people in large modern meeting room having a discussion"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 22, 2024</div> </div> <h3 class="items__title"> Boardroom cyber expertise comes under scrutiny </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/ciso-guide-quantum-safe-readiness/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/GettyImages-886907904-630x330.jpg" alt="Closeup on a hand using an external mouse in front of a computer"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 16, 2024</div> </div> <h3 class="items__title"> The CISO’s guide to accelerating quantum-safe readiness </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/cybersecurity-trends-ibm-predictions-2024/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/New-2024-year-progress-bar-on-digital-lcd-display-with-reflection-630x330.jpeg" alt="A circuit board with blue and red lit circuits and a bar reading 2024 loading in the middle"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 9, 2024</div> </div> <h3 class="items__title"> Cybersecurity trends: IBM’s predictions for 2024 </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/ciso-corner.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/ciso-corner//?mobile" class="link">More on CISO</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Cloud Security</div> <a title="Cloud Security" href="https://securityintelligence.com/category/topics/cloud-protection/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/autonomous-security-for-cloud-in-aws/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Side-view-of-focused-male-developer-coding-on-computer-while-sitting-at-working-at-office-630x330.jpeg" alt="Side view of a male sitting at a desk working on a computer in an office"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 14, 2024</div> </div> <h3 class="items__title"> Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/risk-reward-reality-enterprise-perception-public-cloud/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/Cloud-computing-630x330.jpeg" alt="A man's hand balancing a tablet on his fingertips & a digital cloud hovering above"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 10, 2024</div> </div> <h3 class="items__title"> Risk, reward and reality: Has enterprise perception of the public cloud changed? </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/ai-driven-compliance-key-to-cloud-security/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/06/Cloud-computing-630x330.jpeg" alt="A digital image of several blue clouds with thick white rain coming out below"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jun 6, 2024</div> </div> <h3 class="items__title"> AI-driven compliance: The key to cloud security </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/articles/cisa-nsa-cybersecurity-information-sheets/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Cloud-Computing-Data-Center-Multi-Cloud-Hybrid-Cloud-Information-Storage-Cyber-Security-Encryption-Edge-Computing-Data-Lake-630x330.jpeg" alt="A digital 3D blue cloud floating in front of a large digital display out of focus in the background"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 15, 2024</div> </div> <h3 class="items__title"> <span>Trending in Cloud Security</span> New cybersecurity sheets from CISA and NSA: An overview </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/cloud-protection.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/cloud-protection//?mobile" class="link">More on Cloud Security</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Data Protection</div> <a title="Data Protection" href="https://securityintelligence.com/category/topics/data-protection/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/communication-platforms-major-role-in-data-breach-risks/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Virtual-Video-Conference-Call-Meeting-630x330.jpeg" alt="Looking over the shoulder of a businessman sitting at a desk on a video conference call"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">4 days ago</div> </div> <h3 class="items__title"> Communication platforms play a major role in data breach risks </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/spyagent-malware-targets-crypto-wallets-stealing-screenshots/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Midsection-Of-Man-Using-Mobile-Phone-630x330.jpeg" alt="Midsection Of Man Using Mobile Phone"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 8, 2024</div> </div> <h3 class="items__title"> SpyAgent malware targets crypto wallets by stealing screenshots </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/exploring-dora-how-to-manage-ict-incidents/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Male-financial-advisor-doing-online-payment-through-smart-phone-and-using-laptop-at-cafe-630x330.jpeg" alt="Man working on financials on laptop and smartphone"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 7, 2024</div> </div> <h3 class="items__title"> Exploring DORA: How to manage ICT incidents and minimize cyber threat risks </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/skills-shortage-directly-tied-to-financial-loss-in-data-breaches/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Woman-working-alone-in-office-post-covid-19-lockdown-630x330.jpeg" alt="Businesswoman working alone on her digital tablet sitting at her desk in a large empty office"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 5, 2024</div> </div> <h3 class="items__title"> Skills shortage directly tied to financial loss in data breaches </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/why-safeguarding-sensitive-data-is-crucial/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/Business-people-enhance-your-cyber-security-with-cutting-edge-solutions.-Protect-data-prevent-threats-and-ensure-network-safety-with-our-expert-services-safeguard-data-and-ens-630x330.jpeg" alt="Closeup on a hand holding a smartphone in front of a laptop, both displaying a security shield"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 29, 2024</div> </div> <h3 class="items__title"> Why safeguarding sensitive data is so crucial </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/addressing-growing-concerns-cybersecurity-in-manufacturing/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/10/Female-Technician-programming-on-control-panel-630x330.jpeg" alt="Female technician working on a control panel in a large printery and programming a machine"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 25, 2024</div> </div> <h3 class="items__title"> Addressing growing concerns about cybersecurity in manufacturing </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/data-protection.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/data-protection//?mobile" class="link">More on Data Protection</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Endpoint</div> <a title="Endpoint" href="https://securityintelligence.com/category/topics/endpoint/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/unified-endpoint-management-for-purpose-based-devices/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/11/Manager-walking-and-talking-with-a-worker-in-a-warehouse-630x330.jpeg" alt="Female manager holding a tablet while walking in a warehouse with a female foreman holding a digital inventory scanner"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 28, 2023</div> </div> <h3 class="items__title"> Unified endpoint management for purpose-based devices </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/virtual-credit-card-fraud-old-scam-reinvented/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/10/credit-card-collection-630x330.jpeg" alt="Closeup on multiple black credit cards with highlighted blue numbers"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 30, 2023</div> </div> <h3 class="items__title"> Virtual credit card fraud: An old scam reinvented </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/endpoint-security-in-cloud-what-you-need-to-know/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/10/The-Power-of-Cloud-Computing.-Vibrant-cloud-icon-on-black-background.-Design-element-630x330.jpeg" alt="A vibrant, rainbow colored cloud against a black background"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 19, 2023</div> </div> <h3 class="items__title"> Endpoint security in the cloud: What you need to know </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/posts/does-your-security-program-suffer-piecemeal-detection-response/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/10/TDR-Ft.-Image.jpg-630x330.jpeg" alt="Illustration showing a circle on a grid of colorful dots"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 5, 2023</div> </div> <h3 class="items__title"> <span>Trending in Endpoint</span> Does your security program suffer from piecemeal detection and response? </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/endpoint.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/endpoint//?mobile" class="link">More on Endpoint</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Fraud Protection</div> <a title="Fraud Protection" href="https://securityintelligence.com/category/topics/fraud-protection/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/unveiling-latest-banking-trojan-threats-latam/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/07/computer-security-630x330.jpeg" alt="Closeup on a red computer screen displaying code covered by a large ALERT message"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 25, 2024</div> </div> <h3 class="items__title"> Unveiling the latest banking trojan threats in LATAM </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/pixpirate-brazilian-financial-malware/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/smartphone-malware-concept.-3d-render-630x330.jpeg" alt="A smartphone displaying a full red screen with malware warning set on a blue circuit board"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 13, 2024</div> </div> <h3 class="items__title"> PixPirate: The Brazilian financial malware you can’t see </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/fakext-targeting-latin-american-banks/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/03/Man-using-his-credit-card-online-for-shopping-and-banking-with-sunlight-coming-through-window-630x330.jpeg" alt="Side view of a laptop screen reflecting sun glare and a hand holding a credit card"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 7, 2024</div> </div> <h3 class="items__title"> New Fakext malware targets Latin American banks </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/identity-and-access-management-evolution/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/03/Banner-of-woman-using-laptop-with-VR-interface-on-keyboard-1-630x330.jpeg" alt="Closeup on a hand resting on a keyboard & a projected login prompt floating above in green"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 5, 2024</div> </div> <h3 class="items__title"> From federation to fabric: IAM’s evolution </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/12/Transparency-smart-phone-with-ransomware-attack-warning-sign-630x330.jpeg" alt="A person in a blue jacket holding a smartphone face out with red warning on screen"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Dec 19, 2023</div> </div> <h3 class="items__title"> Web injections are back on the rise: 40+ banks affected by new malware campaign </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/virtual-credit-card-fraud-old-scam-reinvented/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/10/credit-card-collection-630x330.jpeg" alt="Closeup on multiple black credit cards with highlighted blue numbers"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 30, 2023</div> </div> <h3 class="items__title"> Virtual credit card fraud: An old scam reinvented </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/fraud-protection.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/fraud-protection//?mobile" class="link">More on Fraud Protection</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Identity & Access</div> <a title="Identity & Access" href="https://securityintelligence.com/category/topics/identity-access/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/access-control-mobile-the-way-forward/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/09/Cyber-security-630x330.jpeg" alt="A pair of hands holding a smartphone in front of a laptop displaying a fingerprint scanner security application"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Sep 27, 2024</div> </div> <h3 class="items__title"> Access control is going mobile — Is this the way forward? </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/passwords-passkeys-familiarity-bias/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/04/On-Line-Banking-electronic-bank-mobile-app-concept-630x330.jpeg" alt="Closeup on a smartphone being held up & displaying a login prompt"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Apr 23, 2024</div> </div> <h3 class="items__title"> Passwords, passkeys and familiarity bias </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/obtaining-security-clearance-hurdles-requirements/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/04/Man-using-security-card-to-enter-room-in-data-center-630x330.jpeg" alt="A professional man using an ID badge to scan into a locked room"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Apr 16, 2024</div> </div> <h3 class="items__title"> Obtaining security clearance: Hurdles and requirements </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/posts/identity-and-access-management-evolution/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/03/Banner-of-woman-using-laptop-with-VR-interface-on-keyboard-1-630x330.jpeg" alt="Closeup on a hand resting on a keyboard & a projected login prompt floating above in green"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 5, 2024</div> </div> <h3 class="items__title"> <span>Trending in Identity & Access</span> From federation to fabric: IAM’s evolution </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/identity-access.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/identity-access//?mobile" class="link">More on Identity & Access</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Incident Response</div> <a title="Incident Response" href="https://securityintelligence.com/category/topics/incident-response/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/paris-olympic-authorities-battled-cyberattacks-won-gold/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/08/Gold-medal-held-in-athlete-hand-raised-against-sky-background-630x330.jpeg" alt="Gold medal held in athlete hand raised against blue sky background"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 23, 2024</div> </div> <h3 class="items__title"> How Paris Olympic authorities battled cyberattacks, and won gold </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/how-circia-changing-crisis-communication/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/08/the-diplomat-relationship-between-countries.-Diplomatic-relations-And-international-business-partnership-630x330.jpeg" alt="the midsection of two businessmen standing in front of an American flag holding & looking at a portfolio"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 7, 2024</div> </div> <h3 class="items__title"> How CIRCIA is changing crisis communication </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/pr-vs-cybersecurity-teams-handling-disagreements-in-crisis/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/07/Two-young-coworkers-working-on-laptop-computer-in-office.Woman-holding-smartphone-and-pointing-on-notebook-screen.-Horizontal-630x330.jpeg" alt="Coworkers sat at large table having discussion while one works on a laptop & the other on a smartphone"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 31, 2024</div> </div> <h3 class="items__title"> PR vs cybersecurity teams: Handling disagreements in a crisis </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/cybersecurity-crisis-communication-what-to-do/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/07/Diverse-Group-of-People-Talking-in-a-Casual-Modern-Meeting-Room-in-Office.-Group-of-Colleagues-From-Different-Ethnicities-Working-Together-as-a-Team-on-Crisis-Management.-Wide-Shot-630x330.jpeg" alt="A diverse group of people in a modern office having a discussion and working together"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 15, 2024</div> </div> <h3 class="items__title"> Cybersecurity crisis communication: What to do </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/3-recommendations-generative-ai-cyber-defense/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Government-Cybersecurity-Agency-Professionals-Working-on-Personal-Computers-in-Cooperation-with-Army.-Specialists-Working-on-Computers-in-System-Control-Room-630x330.jpeg" alt="Diverse group of professionals working on computers in a dim blue-lit control room"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 14, 2024</div> </div> <h3 class="items__title"> 3 recommendations for adopting generative AI for cyber defense </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/what-we-can-learn-best-collegiate-cyber-defenders/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/young-programmers-working-on-a-new-project-for-a-start-up-business-630x330.jpeg" alt="Looking into a conference room at people sitting at a table talking through a window"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 3, 2024</div> </div> <h3 class="items__title"> What we can learn from the best collegiate cyber defenders </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/incident-response.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/incident-response//?mobile" class="link">More on Incident Response</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Mainframe</div> <a title="Mainframe" href="https://securityintelligence.com/category/topics/mainframe/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/how-dangerous-cyber-attack-risk-transportation/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/05/Transportation-Cybersecurity-630x330.jpeg" alt="The backsides of three people standing on a platform waiting for a subway train as a train speeds by"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 17, 2022</div> </div> <h3 class="items__title"> How dangerous is the cyberattack risk to transportation? </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/low-code-easy-secure/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/03/Close-up-of-a-smart-young-woman-coding-630x330.jpeg" alt="Closeup of a young woman sitting close to a monitor she is studying with her chin propped on her hands"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 28, 2022</div> </div> <h3 class="items__title"> Low-code is easy, but is it secure? </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/starting-from-scratch-how-to-build-a-small-business-cybersecurity-program/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2021/12/Small-business-owner-630x330.jpeg" alt="Small business owner discussing a cybersecurity plan"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Dec 15, 2021</div> </div> <h3 class="items__title"> Starting From Scratch: How to Build a Small Business Cybersecurity Program </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/posts/journey-organizational-resilience-supply-chain-third-parties/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2021/11/Organizational-Resilience-630x330.jpeg" alt="Two businesswomen standing on a city street wearing face masks and bumping elbows"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 8, 2021</div> </div> <h3 class="items__title"> <span>Trending in Mainframe</span> A Journey in Organizational Resilience: Supply Chain and Third Parties </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/mainframe.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/mainframe//?mobile" class="link">More on Mainframe</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Network</div> <a title="Network" href="https://securityintelligence.com/category/topics/network/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/cisa-nsa-cybersecurity-information-sheets/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Cloud-Computing-Data-Center-Multi-Cloud-Hybrid-Cloud-Information-Storage-Cyber-Security-Encryption-Edge-Computing-Data-Lake-630x330.jpeg" alt="A digital 3D blue cloud floating in front of a large digital display out of focus in the background"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 15, 2024</div> </div> <h3 class="items__title"> New cybersecurity sheets from CISA and NSA: An overview </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/easy-configuration-fixes-can-protect-your-server/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/06/Two-women-working-with-computer-in-server-room-630x330.jpeg" alt="Two female IT pros standing in a server room pointing to the servers & holding a tablet"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jun 23, 2023</div> </div> <h3 class="items__title"> Easy configuration fixes can protect your server from attack </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/cybersecurity-next-generation-space-age-pt-4-future-development-challenges/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/03/Rover-on-Mars-630x330.jpeg" alt="Rover on Mars at sunset"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Mar 3, 2023</div> </div> <h3 class="items__title"> Cybersecurity in the next-generation space age, pt. 4: New space future development and challenges </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/posts/cybersecurity-in-the-next-generation-space-age-pt-2-threats/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/02/Space-shuttle-orbiting-earth-satellite-view-630x330.jpeg" alt="A space shuttle orbiting the earth"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Feb 16, 2023</div> </div> <h3 class="items__title"> <span>Trending in Network</span> Cybersecurity in the next-generation space age, pt. 2: Cybersecurity threats in new space </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/network.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/network//?mobile" class="link">More on Network</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Retail</div> <a title="Retail" href="https://securityintelligence.com/category/topics/retail-industry/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/5-improvements-retail-wholesale-holiday-cybersecurity/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/12/Woman-is-window-shopping-in-decorated-street.-630x330.jpeg" alt="A woman dressed in winter clothes holding shopping bags while shopping a mall decorated with Christmas lights"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Dec 16, 2022</div> </div> <h3 class="items__title"> 5 ways to improve holiday retail and wholesale cybersecurity </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/cost-data-breach-retail-costs-risks-prevention/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/08/Clothing-Store-Checkout-Cashier-Counter-Beautiful-Young-Woman-Buys-Blouse-from-Friendly-Retail-Sales-assistant-Paying-with-Contactless-Credit-Card.-Fashion-Shop-with-of-Designer--630x330.jpeg" alt="A wide view of a clothing store with shoppers in the background and a woman at the checkout counter making a purchase"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 31, 2022</div> </div> <h3 class="items__title"> Cost of a data breach: Retail costs, risks and prevention strategies </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/lessons-learned-top-cyberattacks-x-force/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/05/GettyImages-1318358294.jpg-630x330.jpeg" alt="A smartly dressed woman standing at a desk in the foreground of a fully stocked warehouse with men working in the back"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 26, 2022</div> </div> <h3 class="items__title"> Lessons learned by 2022 cyberattacks: X-Force Threat Intelligence Report </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/magecart-software-supply-chain/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/01/Female-businesswoman-using-a-digital-device-in-a-small-business-630x330.jpeg" alt="A businesswoman standing in front of supply shelves working on a tablet"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 21, 2022</div> </div> <h3 class="items__title"> Magecart Attacks Continue to ‘Skim’ Software Supply Chains </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/omnichannel-growth-increases-api-risk/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2022/01/eCommerce-630x330.jpeg" alt="Closeup of a man's hands holding a credit card and typing on a laptop keyboard"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 10, 2022</div> </div> <h3 class="items__title"> Omnichannel E-commerce Growth Increases API Security Risk </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/shopping-bots-compromise-retail-cybersecurity/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2021/10/1200x630_SHOPBOT.jpg-630x330.jpeg" alt="An African-American woman sitting on her couch next to shopping bags, doing some online shopping from her laptop"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Oct 28, 2021</div> </div> <h3 class="items__title"> How Shopping Bots Can Compromise Retail Cybersecurity </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/retail-industry.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/retail-industry//?mobile" class="link">More on Retail</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Risk Management</div> <a title="Risk Management" href="https://securityintelligence.com/category/topics/risk-management/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Banking-630x330.jpeg" alt="A businessman walking through an office talking on a smartphone and carrying a folder"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">1 day ago</div> </div> <h3 class="items__title"> What does resilience in the cyber world look like in 2025 and beyond? </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/airplane-cybersecurity-past-present-future/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Pilot-Switching-a-Control-in-the-Cockpit-of-a-Commercial-Aeroplane-630x330.jpeg" alt="In the cockpit of a commercial airplane a pilot is switching on controls"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">2 days ago</div> </div> <h3 class="items__title"> Airplane cybersecurity: Past, present, future </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/protecting-digital-assets-non-human-identity-attacks/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Backdrop-with-icons-and-an-electronic-circuit-board.-Fingerprint-identification-is-used-to-get-access-to-a-secure-computer-network-and-digital-system.-Biometrics-technology-for-cyb-630x330.jpeg" alt="Closeup on a blue circuit board with a fingerprint inside of a dotted square"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">3 days ago</div> </div> <h3 class="items__title"> Protecting your digital assets from non-human identity attacks </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/articles/cybersecurity-dominates-concerns-c-suite-small-businesses-nation/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Young-couple-working-behind-counter-in-music-store-630x330.jpeg" alt="A young man & woman working behind the counter in a music store"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Nov 15, 2024</div> </div> <h3 class="items__title"> <span>Trending in Risk Management</span> Cybersecurity dominates concerns among the C-suite, small businesses and the nation </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/risk-management.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/risk-management//?mobile" class="link">More on Risk Management</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Intelligence & Analytics</div> <a title="Intelligence & Analytics" href="https://securityintelligence.com/category/topics/security-intelligence-analytics/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/new-report-shows-gender-pay-gap-in-cybersecurity/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/09/Salary-and-wage-gap-concept.-Gender-symbols-and-money-630x330.jpeg" alt="Salary and wage gap concept. Gender symbols and money."></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Sep 5, 2024</div> </div> <h3 class="items__title"> New report shows ongoing gender pay gap in cybersecurity </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/news/protecting-data-environment-from-unknown-external-risks/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/08/Portrait-of-security-guard-wearing-uniform-in-computer-server-room-630x330.jpeg" alt="A security guard holding a flashlight and standing in front of several servers"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 21, 2024</div> </div> <h3 class="items__title"> Protecting your data and environment from unknown external risks </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/accelerating-security-outcomes-cloud-native-siem/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/12/Storm-clouds-at-sunrise-630x330.jpeg" alt="White fluffy clouds in a blue sky with the sun and rays coming through the clouds"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Dec 14, 2023</div> </div> <h3 class="items__title"> Accelerating security outcomes with a cloud-native SIEM </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/unmasking-hypnotized-ai-hidden-risks-large-language-models/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/08/Swirl-Spiral-Vortex-Prism-Neon-Purple-Circle-Speed-Laser-Motion-Pattern-Lens-Light-Painting-Holographic-Background-Shiny-Disk-Abstract-Magenta-Vibrant-Red-Ultra-Violet-Blue-Retro-S-630x330.jpeg" alt="Colorful Neon Purple Violet Red Holographic Circle Swirl Spiral Vortex Prism"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 8, 2023</div> </div> <h3 class="items__title"> Unmasking hypnotized AI: The hidden risks of large language models </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/rise-of-malicious-chrome-extensions-targeting-latin-america/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/07/Virus-warning-alert-on-computer-screen-detected-modish-cyber-threat-630x330.jpeg" alt="Virus warning alert on computer screen indicating cyber threat detected"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 28, 2023</div> </div> <h3 class="items__title"> The rise of malicious Chrome extensions targeting Latin America </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/whats-new-2023-cost-of-a-data-breach-report/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/07/Cost-of-a-Data-Breach-2023-Illustration.jpg-630x330.jpeg" alt="Illustration of squiggly, colorful lines emitting from a red-orange circle."></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 24, 2023</div> </div> <h3 class="items__title"> What’s new in the 2023 Cost of a Data Breach report </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/security-intelligence-analytics.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/security-intelligence-analytics//?mobile" class="link">More on Intelligence & Analytics</a> </div> </div> </div> </div> </div> </section> <section class="type-featured"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Security Services</div> <a title="Security Services" href="https://securityintelligence.com/category/topics/security-services/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/news/protecting-data-environment-from-unknown-external-risks/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/08/Portrait-of-security-guard-wearing-uniform-in-computer-server-room-630x330.jpeg" alt="A security guard holding a flashlight and standing in front of several servers"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 21, 2024</div> </div> <h3 class="items__title"> Protecting your data and environment from unknown external risks </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/msps-report-setbacks-adapting-advanced-security-technologies/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/07/Behind-the-scenes-of-an-error-message-630x330.jpeg" alt="Rearview shot of an IT technician with his hands on his head having difficulty repairing a computer in a data center"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 11, 2024</div> </div> <h3 class="items__title"> 39% of MSPs report major setbacks when adapting to advanced security technologies </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/decade-global-cyberattacks-where-they-left-us/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/07/security-global-network-630x330.jpeg" alt="A transparent blue digital globe of Earth with a cybersecurity shield in a circle on the front"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jul 9, 2024</div> </div> <h3 class="items__title"> A decade of global cyberattacks, and where they left us </h3> </a> </article> <article class="items__article card"> <a class="items__link" href="https://securityintelligence.com/posts/new-wave-deepfake-cybercrime/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Deep-fake-AI-and-face-swap-in-video-edit.-Deepfake-and-machine-learning.-Facial-tracking-detection-and-recognition-technology.-Digital-identity-interchange.-Computer-software-moc-630x330.jpeg" alt="A computer displaying deepfake AI face swap technology to add a man's face to another image"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 17, 2024</div> </div> <h3 class="items__title"> <span>Trending in Security Services</span> How a new wave of deepfake-driven cyber crime targets businesses </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/security-services.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/security-services//?mobile" class="link">More on Security Services</a> </div> </div> </div> </div> </div> </section> <section class="type-list"> <div class="container"> <div class="row"> <div class="items"> <div class="row"> <!-- TITLE --> <header class="title"> <div class="title__name">Threat Hunting</div> <a title="Threat Hunting" href="https://securityintelligence.com/category/topics/threat-hunting/" class="title__link title__link--button">See More Articles</a> <div class="title__wave"></div> </header> <!-- ARTICLES --> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/3-recommendations-generative-ai-cyber-defense/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/Government-Cybersecurity-Agency-Professionals-Working-on-Personal-Computers-in-Cooperation-with-Army.-Specialists-Working-on-Computers-in-System-Control-Room-630x330.jpeg" alt="Diverse group of professionals working on computers in a dim blue-lit control room"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 14, 2024</div> </div> <h3 class="items__title"> 3 recommendations for adopting generative AI for cyber defense </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/what-we-can-learn-best-collegiate-cyber-defenders/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/05/young-programmers-working-on-a-new-project-for-a-start-up-business-630x330.jpeg" alt="Looking into a conference room at people sitting at a table talking through a window"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">May 3, 2024</div> </div> <h3 class="items__title"> What we can learn from the best collegiate cyber defenders </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/ermac-malware-the-other-side-of-the-code/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/01/Close-up-of-programmer-with-binary-code-reflected-in-eyeglasses-630x330.jpeg" alt="Close-up of programmer with binary code reflected in eyeglasses"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Jan 29, 2024</div> </div> <h3 class="items__title"> Ermac malware: The other side of the code </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/articles/soar-and-siem-in-2023-key-trends-and-new-changes/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/07/SIB_SOAR-SIEM_FeatureImage@2x-630x330.png" alt="Illustration of security professionals working in a SOC"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 16, 2023</div> </div> <h3 class="items__title"> SIEM and SOAR in 2023: Key trends and new changes </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/threat-hunting-101-how-to-outthink-attackers/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/08/threat-hunting--630x330.jpeg" alt="A man sitting at a desk working on coding on a computer with two monitors"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 15, 2023</div> </div> <h3 class="items__title"> Threat hunting 101: How to outthink attackers </h3> </a> </article> <article class="items__article"> <a class="items__link" href="https://securityintelligence.com/posts/vulnerability-management-impact-threat-modeling-methodologies/"> <div class="items__image"> <amp-img width="630" height="330" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2023/08/computer-security-630x330.jpeg" alt="computer screen with programming code and an alert message"></amp-img> </div> <div class="items__labels"> <div class="items__date-and-time">Aug 10, 2023</div> </div> <h3 class="items__title"> Vulnerability management, its impact and threat modeling methodologies </h3> </a> </article> <div class="more"> <amp-img class="icon-category" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/category-icons/threat-hunting.svg" alt="A male and female IT pro discuss data shown on a laptop standing in front of a large screen displaying infographics"></amp-img> <svg class="icon" width="19" height="16" viewBox="0 0 19 16" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><g id="Icons" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g id="icons/arrows/ibm-forward-link" transform="translate(-2.000000, -4.000000)" fill="#0062FF"><polygon id="icon-color" points="13.5 4.5 12.4425 5.5575 18.1275 11.25 2.25 11.25 2.25 12.75 18.1275 12.75 12.4425 18.4425 13.5 19.5 21 12"></polygon></g></g></svg> <a href="https://securityintelligence.com/category/topics/threat-hunting//?mobile" class="link">More on Threat Hunting</a> </div> </div> </div> </div> </div> </section> </main> <aside id="topics-sidebar"> <div class="container"> <div class="row"> <div id="topics-sidebar__sticky" class="sticky topics-sidebar__with-global-ad""> <div id="filter" class="name arrow-up" role="button" tabindex="1" on="tap:carousel.toggleClass(class='minimized'), accordion.toggleClass(class='minimized'), filter.toggleClass(class='arrow-up'), slides.goToSlide(index=0), close.toggleVisibility"> Filter by Topic <svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 443.52 443.52" style="enable-background:new 0 0 443.52 443.52;" xml:space="preserve"><g><g><path d="M336.226,209.591l-204.8-204.8c-6.78-6.548-17.584-6.36-24.132,0.42c-6.388,6.614-6.388,17.099,0,23.712l192.734,192.734L107.294,414.391c-6.663,6.664-6.663,17.468,0,24.132c6.665,6.663,17.468,6.663,24.132,0l204.8-204.8C342.889,227.058,342.889,216.255,336.226,209.591z"/></g></g></svg></div> <div id="carousel" class="carousel minimized"> <amp-carousel id="slides" type="slides" layout="fill" controls loop> <div class="slide"> <div class="row"> <a href="/category/app-security/" title="Application Security" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-applicationSecurity</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M8.2,8.33V2.45A1.31,1.31,0,0,1,9.5,1.14H31.55a1.31,1.31,0,0,1,1.31,1.31v29.1a1.31,1.31,0,0,1-1.31,1.31H9.5"/><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="1.14" y="8.33" width="14.11" height="24.53" rx="1.31" ry="1.31"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M15.25,13.38h6.21a1.31,1.31,0,0,1,1.31,1.3V31.55a1.31,1.31,0,0,1-1.31,1.31"/><line id="_Path_3" data-name="<Path>" class="cls-2" x1="1.14" y1="27.37" x2="15.25" y2="27.37"/><line id="_Path_4" data-name="<Path>" class="cls-2" x1="15.25" y1="27.37" x2="32.86" y2="27.37"/><circle id="_Path_5" data-name="<Path>" cx="8.2" cy="30.11" r="0.95"/></svg> </div> <div class="sidebar__title">Application Security</div> </a> <a href="/category/artificial-intelligence/" title="Artificial Intelligence" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-artificialIntelligence</title><g id="_Group_" data-name="<Group>"><line id="_Path_" data-name="<Path>" class="cls-1" x1="13.76" y1="22.34" x2="13.76" y2="30.32"/><line id="_Path_2" data-name="<Path>" class="cls-1" x1="20.24" y1="22.34" x2="20.24" y2="30.32"/><path id="_Path_3" data-name="<Path>" class="cls-2" d="M11.23,32.86a2.54,2.54,0,1,1,5.07,0Z"/><path id="_Path_4" data-name="<Path>" class="cls-2" d="M17.7,32.86a2.54,2.54,0,1,1,5.07,0Z"/><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-2" x="14.84" y="2.87" width="4.33" height="1.64" rx="0.82" ry="0.82"/><rect id="_Path_5" data-name="<Path>" class="cls-2" x="12.75" y="1.14" width="8.51" height="5.1"/><line id="_Path_6" data-name="<Path>" class="cls-2" x1="22.54" y1="2.91" x2="22.54" y2="4.34"/><line id="_Path_7" data-name="<Path>" class="cls-2" x1="11.46" y1="2.91" x2="11.46" y2="4.34"/><line id="_Path_8" data-name="<Path>" class="cls-1" x1="17" y1="6.24" x2="17" y2="9.06"/><rect id="_Rectangle_2" data-name="<Rectangle>" class="cls-2" x="11.26" y="9.07" width="11.65" height="13.27"/></g><g id="_Group_2" data-name="<Group>"><path id="_Path_9" data-name="<Path>" class="cls-2" d="M30.73,16.08l-.85-.47h0l-.62.18a1.17,1.17,0,0,0-.79,1.45h0A1.16,1.16,0,0,0,29.9,18l.63-.18"/><polyline id="_Path_10" data-name="<Path>" class="cls-1" points="24.58 14.48 25.65 17.88 28.42 17.19"/><path id="_Path_11" data-name="<Path>" class="cls-1" d="M22.91,10.61h1.27a1.95,1.95,0,1,1,0,3.89H22.91"/></g><g id="_Group_3" data-name="<Group>"><path id="_Path_12" data-name="<Path>" class="cls-1" d="M11.26,10.61H9.82a1.95,1.95,0,1,0,0,3.89h1.44"/><path id="_Path_13" data-name="<Path>" class="cls-2" d="M3.27,16.08l.85-.47h0l.62.18a1.17,1.17,0,0,1,.79,1.45h0A1.16,1.16,0,0,1,4.1,18l-.63-.18"/><polyline id="_Path_14" data-name="<Path>" class="cls-1" points="9.43 14.47 8.35 17.88 5.58 17.19"/></g></svg> </div> <div class="sidebar__title">Artificial Intelligence</div> </a> <a href="/category/industries/banking-financial-services/" title="Banking & Finance" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-bankingFinance</title><line class="cls-1" x1="19.93" y1="18.46" x2="23.45" y2="18.46"/><polyline class="cls-1" points="19.93 15.21 21.68 17.36 23.49 15.21"/><line class="cls-1" x1="21.68" y1="20.04" x2="21.68" y2="17.36"/><line class="cls-1" x1="12.78" y1="6.73" x2="12.78" y2="7.6"/><line class="cls-1" x1="12.78" y1="12.56" x2="12.78" y2="13.43"/><path class="cls-1" d="M11.22,12.05a2.45,2.45,0,0,0,1.46.5c.85,0,1.52-.42,1.52-1.25,0-1.63-2.86-.82-2.86-2.63,0-.65.56-1.06,1.52-1.06a2.37,2.37,0,0,1,1.45.51"/><line class="cls-1" x1="11.18" y1="23.91" x2="13.74" y2="23.91"/><path class="cls-1" d="M14.48,21.72a1.7,1.7,0,0,0-1.25-.52c-.86,0-1.56.4-1.56,1.36,0,.73.52,1.38.52,2.1a1.48,1.48,0,0,1-.92,1.48h3.26"/><circle class="cls-2" cx="17" cy="17" r="15.86"/><ellipse class="cls-2" cx="17" cy="17" rx="10.19" ry="15.86"/><line class="cls-3" x1="17" y1="1.14" x2="17" y2="32.86"/><line class="cls-3" x1="17" y1="17" x2="1.14" y2="17"/><line class="cls-3" x1="8.16" y1="9.07" x2="3.4" y2="9.07"/><line class="cls-3" x1="30.59" y1="9.07" x2="17.21" y2="9.07"/><line class="cls-3" x1="8.16" y1="24.92" x2="3.4" y2="24.92"/><line class="cls-3" x1="30.75" y1="24.93" x2="17.21" y2="24.93"/><line class="cls-3" x1="32.86" y1="17.01" x2="27.19" y2="17.01"/></svg> </div> <div class="sidebar__title">Banking & Finance</div> </a> <a href="/category/ciso-corner/" title="CISO" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><defs></defs><title>si-icon-topic-CISO</title><path class="cls-1" d="M8,28.29a9.11,9.11,0,0,1,7-8.83,5.15,5.15,0,1,1,4.17,0h.06a8.67,8.67,0,0,1,6.35,6.86,8.39,8.39,0,0,1,.23,2.07"/><path class="cls-2" d="M17,32.77A11.54,11.54,0,0,1,5.48,21.25V7L17,1.23,28.52,7V21.25A11.54,11.54,0,0,1,17,32.77Z"/></svg> </div> <div class="sidebar__title">CISO</div> </a> <a href="/category/cloud-protection/" title="Cloud Security" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-cloudSecurity</title><path class="cls-1" d="M8,27.38a7.94,7.94,0,1,1,4.08-15.22,7.9,7.9,0,0,1,15.06,2.93,6.16,6.16,0,0,1-.42,12.3H8Z"/></svg> </div> <div class="sidebar__title">Cloud Security</div> </a> <a href="/category/data-protection/" title="Data Protection" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-dataProtection</title><path class="cls-1" d="M25.59,16.88a10.32,10.32,0,1,1-4.36-3.68"/><circle class="cls-2" cx="17" cy="22.64" r="6.58"/><path class="cls-2" d="M23.58,22.64V7.6a6.58,6.58,0,1,0-13.16,0v15.5"/></svg> </div> <div class="sidebar__title">Data Protection</div> </a> <a href="/category/endpoint/" title="Endpoint" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-mobileSecurity</title><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="7.85" y="1.1" width="18.29" height="31.81" rx="1.31" ry="1.31"/><line id="_Path_" data-name="<Path>" class="cls-2" x1="7.85" y1="26.32" x2="26.15" y2="26.32"/><circle id="_Path_2" data-name="<Path>" cx="17" cy="29.88" r="1.24"/></svg> </div> <div class="sidebar__title">Endpoint</div> </a> <a href="/category/energy-utility/" title="Energy & Utility" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-energyUtility</title><path class="cls-1" d="M17,1.46a9.84,9.84,0,0,0-9.87,9.8,10.63,10.63,0,0,0,3.28,7.23c2.26,2.33,2.8,3.93,2.8,5.76v.5h7.58v-.5c0-1.83.54-3.43,2.8-5.76a10.63,10.63,0,0,0,3.28-7.23A9.84,9.84,0,0,0,17,1.46"/><line class="cls-1" x1="13.21" y1="29.92" x2="20.79" y2="29.92"/><line class="cls-1" x1="13.21" y1="27.29" x2="20.79" y2="27.29"/><line class="cls-1" x1="14.68" y1="32.54" x2="19.32" y2="32.54"/></svg> </div> <div class="sidebar__title">Energy & Utility</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/fraud-protection/" title="Fraud Protection" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-fraudProtection</title><g id="_Group_" data-name="<Group>"><path class="cls-1" d="M23.22,24.93H4A1.77,1.77,0,0,1,2.2,23.17V8.12A1.77,1.77,0,0,1,4,6.36H26.35a1.76,1.76,0,0,1,1.77,1.76v7.53"/></g><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="2.2" y="10.18" width="25.92" height="2.87"/><path class="cls-1" d="M28.12,27.64A3.68,3.68,0,0,1,24.45,24V19.42l3.67-1.84,3.68,1.84V24A3.68,3.68,0,0,1,28.12,27.64Z"/></svg> </div> <div class="sidebar__title">Fraud Protection</div> </a> <a href="/category/government/" title="Government" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-government</title><path class="cls-1" d="M1.14,17a4.84,4.84,0,0,0,9.68,0Z"/><circle class="cls-1" cx="17" cy="10.17" r="2.03"/><path class="cls-1" d="M14.47,31.93a2.53,2.53,0,0,1,5.06,0"/><polygon class="cls-1" points="5.98 7.95 10.82 17.01 1.14 17.01 5.98 7.95"/><path class="cls-1" d="M23.18,11.12a4.84,4.84,0,1,0,9.68,0Z"/><polygon class="cls-1" points="28.02 2.07 32.86 11.12 23.18 11.12 28.02 2.07"/><line class="cls-2" x1="5.98" y1="7.95" x2="28.02" y2="2.07"/><line class="cls-2" x1="17" y1="5.01" x2="17" y2="8.14"/><line class="cls-2" x1="17" y1="12.18" x2="17" y2="29.4"/><line class="cls-1" x1="25.92" y1="31.93" x2="7.35" y2="31.93"/></svg> </div> <div class="sidebar__title">Government</div> </a> <a href="/category/health-care/" title="Healthcare" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-hetitlehcare</title><circle cx="5.87" cy="17.07" r="0.52"/><circle class="cls-1" cx="5.87" cy="17.07" r="2.12"/><path class="cls-2" d="M21.8,21v4.22a7.82,7.82,0,0,1-8,7.68,7.85,7.85,0,0,1-8-7.68V19.25"/><path class="cls-1" d="M16.08,1.14H13.35V12.5a8.46,8.46,0,1,0,16.91,0V1.14H27.69"/></svg> </div> <div class="sidebar__title">Healthcare</div> </a> <a href="/category/identity-access/" title="Identity & Access" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-identityAccessManagement</title><path class="cls-1" d="M5.64,5.92A15.87,15.87,0,0,1,28.39,6"/><path class="cls-1" d="M28.85,10.87A14.2,14.2,0,0,0,17,4.46C10.37,4.46,6.57,8.52,4,12.38"/><path class="cls-1" d="M28.7,27c-2.08-.9-2.6-2.12-2.6-4.33,0-2.8.68-2.66.68-6.16,0-4.06-3.57-8.81-9.82-8.81-4.59,0-6.79,2.3-8.63,4.59-1.12,1.4-2.85,4.15-5.08,5.05"/><path class="cls-1" d="M3.25,21.66c3-1.09,5.44-3.81,7-6.4C11.54,13,13.77,10.87,17,10.87a6.62,6.62,0,0,1,6.61,6.44c0,2.68-.83,4.38-.83,6.3a5.92,5.92,0,0,0,4,5.93"/><path class="cls-1" d="M3.83,25.26A25.06,25.06,0,0,0,10.11,21c2.11-2.07,3.83-6.89,6.85-6.89a3.61,3.61,0,0,1,3.54,3.75c0,2.42-1.62,4.8-3.54,6.63a54,54,0,0,1-7.88,6.26"/><path class="cls-1" d="M17,18.15c-2.32,4.35-6.58,7.94-10.75,10.51"/><path class="cls-1" d="M12.17,32.11c.91-1.35,1.83-2.22,3.38-2.22a3,3,0,0,1,2.83,3"/><path class="cls-1" d="M19.77,25a5.91,5.91,0,0,0-.36,2,6,6,0,0,0,3.11,4.9"/><path class="cls-1" d="M29.86,13.24a10,10,0,0,1,.89,4.42,11.06,11.06,0,0,1-1.62,6.13"/></svg> </div> <div class="sidebar__title">Identity & Access</div> </a> <a href="/category/incident-response/" title="Incident Response" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-incidentResponse</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M26.19,32.36V25.68a9.19,9.19,0,0,0-7.06-8.94,5.24,5.24,0,1,0-4.26,0,9.19,9.19,0,0,0-7.06,8.94v6.68"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M15.35,6.88A5.24,5.24,0,1,0,8,11.67,9.19,9.19,0,0,0,.92,20.61"/><path id="_Path_3" data-name="<Path>" class="cls-1" d="M18.65,6.88A5.24,5.24,0,1,1,26,11.67a9.19,9.19,0,0,1,7.07,8.94"/><circle cx="17" cy="14.1" r="1.09"/><path class="cls-2" d="M22.09,10.71a4.61,4.61,0,0,1-4.24,3.39"/></svg> </div> <div class="sidebar__title">Incident Response</div> </a> <a href="/category/mainframe/" title="Mainframe" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-mainframe</title><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="9.11" y="1.14" width="15.79" height="31.72"/><line id="_Path_" data-name="<Path>" class="cls-1" x1="12.88" y1="12.39" x2="21.12" y2="12.39"/><line id="_Path_2" data-name="<Path>" class="cls-1" x1="12.88" y1="8.64" x2="21.12" y2="8.64"/><line id="_Path_3" data-name="<Path>" class="cls-1" x1="12.88" y1="4.89" x2="21.12" y2="4.89"/><g id="_Group_" data-name="<Group>"><polyline id="_Path_4" data-name="<Path>" class="cls-2" points="24.89 4.89 32.86 4.89 32.86 29.11 24.89 29.11"/><line id="_Path_5" data-name="<Path>" class="cls-1" x1="24.9" y1="16.14" x2="29.02" y2="16.14"/><line id="_Path_6" data-name="<Path>" class="cls-1" x1="24.9" y1="12.39" x2="29.02" y2="12.39"/><line id="_Path_7" data-name="<Path>" class="cls-1" x1="24.9" y1="8.64" x2="29.02" y2="8.64"/></g><g id="_Group_2" data-name="<Group>"><polyline id="_Path_8" data-name="<Path>" class="cls-2" points="9.11 4.89 1.14 4.89 1.14 29.11 9.11 29.11"/><line id="_Path_9" data-name="<Path>" class="cls-1" x1="9.11" y1="16.14" x2="4.89" y2="16.14"/><line id="_Path_10" data-name="<Path>" class="cls-1" x1="9.11" y1="12.39" x2="4.89" y2="12.39"/><line id="_Path_11" data-name="<Path>" class="cls-1" x1="9.11" y1="8.64" x2="4.89" y2="8.64"/></g></svg> </div> <div class="sidebar__title">Mainframe</div> </a> <a href="/category/network/" title="Network" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-network</title><circle id="_Path_" data-name="<Path>" cx="4.22" cy="25.31" r="0.95"/><circle id="_Path_2" data-name="<Path>" cx="8.04" cy="25.31" r="0.95"/><circle id="_Path_3" data-name="<Path>" cx="11.86" cy="25.31" r="0.95"/><path id="_Path_4" data-name="<Path>" class="cls-1" d="M22.68,9a4.82,4.82,0,0,1,7,0"/><path id="_Path_5" data-name="<Path>" class="cls-1" d="M21.49,6.9a7.18,7.18,0,0,1,9.33,0"/><path id="_Path_6" data-name="<Path>" class="cls-1" d="M20.29,4.8A9.58,9.58,0,0,1,32,4.81"/><rect id="_Path_7" data-name="<Path>" class="cls-1" x="1.14" y="19.41" width="31.72" height="11.79" rx="1.69" ry="1.69"/><line id="_Path_8" data-name="<Path>" class="cls-1" x1="26.16" y1="19.41" x2="26.16" y2="11.09"/></svg> </div> <div class="sidebar__title">Network</div> </a> <a href="/category/industries/retail/" title="Retail" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-retail</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M2,2H5.33l3,14.53c.55,2.14,1.48,3.17,3.2,3.17H27.86a2.39,2.39,0,0,0,2.63-2.25L32,6.31H9.55"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M6.65,8.39l2.69,13c.46,2.13,1.42,3.16,3.21,3.16H30"/><circle id="_Path_3" data-name="<Path>" class="cls-1" cx="12.35" cy="29.8" r="2.25"/><circle id="_Path_4" data-name="<Path>" class="cls-1" cx="26.31" cy="29.8" r="2.25"/></svg> </div> <div class="sidebar__title">Retail</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/risk-management/" title="Risk Management" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-riskManagement</title><path class="cls-1" d="M6.36,32.86,9,28.29M22.17,5.67l2.64-4.53M7.6,30.72a16.07,16.07,0,0,0,21.83-5.81A15.78,15.78,0,0,0,23.58,3.25M28.75,17A13.16,13.16,0,1,0,15.59,30,13.11,13.11,0,0,0,28.75,17Z"/><path d="M19.5,24.29a.75.75,0,1,0-1,.27.76.76,0,0,0,1-.27"/><path d="M24.71,15.32a.75.75,0,0,0-.28-1,.76.76,0,0,0-1,.27.75.75,0,0,0,1.31.75"/><path d="M16.89,16.81a.74.74,0,0,0-.27-1,.76.76,0,0,0-1,.28.75.75,0,0,0,1.3.74"/><path d="M23.4,18.32a.75.75,0,0,0,1.31-.75.77.77,0,0,0-1-.27.75.75,0,0,0-.28,1"/><path d="M7.79,9.35a.75.75,0,0,0,1,.28.75.75,0,0,0,.28-1,.76.76,0,0,0-1-.28.74.74,0,0,0-.27,1"/><path d="M9.08,15.32a.74.74,0,0,0-.27-1,.76.76,0,0,0-1,.27.75.75,0,0,0,.28,1,.74.74,0,0,0,1-.27"/></svg> </div> <div class="sidebar__title">Risk Management</div> </a> <a href="/category/security-intelligence-analytics/" title="Security Intelligence & Analytics" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-securityAnalytics</title><circle id="_Path_" data-name="<Path>" class="cls-1" cx="17" cy="23" r="2.03"/><circle id="_Path_2" data-name="<Path>" class="cls-1" cx="26.04" cy="9.08" r="2.03"/><circle id="_Path_3" data-name="<Path>" class="cls-1" cx="7.84" cy="17.02" r="2.03"/><line id="_Path_4" data-name="<Path>" class="cls-2" x1="5.81" y1="17.01" x2="1.14" y2="17.01"/><line id="_Path_5" data-name="<Path>" class="cls-1" x1="32.86" y1="9.08" x2="28.26" y2="9.08"/><line id="_Path_6" data-name="<Path>" class="cls-2" x1="9.53" y1="18.15" x2="15.28" y2="21.92"/><line id="_Path_7" data-name="<Path>" class="cls-2" x1="18.08" y1="21.28" x2="25.01" y2="10.83"/><polyline class="cls-1" points="1.14 1.14 1.14 32.86 32.86 32.86"/></svg> </div> <div class="sidebar__title">Security Analytics</div> </a> <a href="/category/security-services/" title="Security Services" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-securityServices</title><path class="cls-1" d="M19.54,3.68A2.54,2.54,0,1,0,17,6.23,2.54,2.54,0,0,0,19.54,3.68Z"/><path class="cls-1" d="M29.81,12.54a2.54,2.54,0,1,0-3.47-.93A2.55,2.55,0,0,0,29.81,12.54Z"/><path class="cls-1" d="M27.27,25.86a2.54,2.54,0,1,0-.93-3.47A2.54,2.54,0,0,0,27.27,25.86Z"/><path class="cls-1" d="M14.46,30.32A2.54,2.54,0,1,0,17,27.77,2.54,2.54,0,0,0,14.46,30.32Z"/><path class="cls-1" d="M4.19,21.46a2.54,2.54,0,1,0,3.47.93A2.55,2.55,0,0,0,4.19,21.46Z"/><path class="cls-1" d="M6.74,8.14a2.54,2.54,0,1,0,.93,3.47A2.56,2.56,0,0,0,6.74,8.14Z"/><line class="cls-2" x1="14.95" y1="4.81" x2="7.63" y2="9.02"/><line class="cls-2" x1="26.4" y1="24.93" x2="19.23" y2="29.07"/><line class="cls-2" x1="5.36" y1="12.87" x2="5.36" y2="21.13"/><line class="cls-2" x1="28.63" y1="12.87" x2="28.63" y2="21.1"/><line class="cls-2" x1="19.23" y1="4.92" x2="26.35" y2="9.01"/><line class="cls-2" x1="7.65" y1="25.01" x2="14.71" y2="29.23"/><line class="cls-2" x1="21.43" y1="19.56" x2="26.34" y2="22.39"/><line class="cls-2" x1="17" y1="11.88" x2="17" y2="6.22"/><line class="cls-2" x1="12.57" y1="19.56" x2="7.66" y2="22.39"/><polygon id="_Path_" data-name="<Path>" class="cls-2" points="17 11.88 21.43 14.44 21.43 19.56 17 22.12 12.57 19.56 12.57 14.44 17 11.88"/></svg> </div> <div class="sidebar__title">Security Services</div> </a> <a href="/category/threat-hunting/" title="Threat Hunting" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 31.97"><title>si-icon-topic-threatHunting</title><circle class="cls-1" cx="17" cy="15.98" r="15.03" transform="translate(-0.02 0.02) rotate(-0.06)"/><path class="cls-1" d="M6.9,16A10.1,10.1,0,1,1,17,26.08,10.1,10.1,0,0,1,6.9,16Z"/><path class="cls-1" d="M12,16a5,5,0,1,1,5,5A5,5,0,0,1,12,16Z"/><path d="M18.1,16a1.1,1.1,0,1,0-1.1,1.1A1.1,1.1,0,0,0,18.1,16"/></svg> </div> <div class="sidebar__title">Threat Hunting</div> </a> </div> </div> </amp-carousel> </div> <div id="accordion" class="carousel accordion minimized"> <amp-carousel id="slides-mobile" type="slides" layout="fill" controls loop> <div class="slide"> <div class="row"> <a href="/category/app-security/" title="Application Security" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-applicationSecurity</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M8.2,8.33V2.45A1.31,1.31,0,0,1,9.5,1.14H31.55a1.31,1.31,0,0,1,1.31,1.31v29.1a1.31,1.31,0,0,1-1.31,1.31H9.5"/><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="1.14" y="8.33" width="14.11" height="24.53" rx="1.31" ry="1.31"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M15.25,13.38h6.21a1.31,1.31,0,0,1,1.31,1.3V31.55a1.31,1.31,0,0,1-1.31,1.31"/><line id="_Path_3" data-name="<Path>" class="cls-2" x1="1.14" y1="27.37" x2="15.25" y2="27.37"/><line id="_Path_4" data-name="<Path>" class="cls-2" x1="15.25" y1="27.37" x2="32.86" y2="27.37"/><circle id="_Path_5" data-name="<Path>" cx="8.2" cy="30.11" r="0.95"/></svg> </div> <div class="sidebar__title">Application Security</div> </a> <a href="/category/artificial-intelligence/" title="Artificial Intelligence" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-artificialIntelligence</title><g id="_Group_" data-name="<Group>"><line id="_Path_" data-name="<Path>" class="cls-1" x1="13.76" y1="22.34" x2="13.76" y2="30.32"/><line id="_Path_2" data-name="<Path>" class="cls-1" x1="20.24" y1="22.34" x2="20.24" y2="30.32"/><path id="_Path_3" data-name="<Path>" class="cls-2" d="M11.23,32.86a2.54,2.54,0,1,1,5.07,0Z"/><path id="_Path_4" data-name="<Path>" class="cls-2" d="M17.7,32.86a2.54,2.54,0,1,1,5.07,0Z"/><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-2" x="14.84" y="2.87" width="4.33" height="1.64" rx="0.82" ry="0.82"/><rect id="_Path_5" data-name="<Path>" class="cls-2" x="12.75" y="1.14" width="8.51" height="5.1"/><line id="_Path_6" data-name="<Path>" class="cls-2" x1="22.54" y1="2.91" x2="22.54" y2="4.34"/><line id="_Path_7" data-name="<Path>" class="cls-2" x1="11.46" y1="2.91" x2="11.46" y2="4.34"/><line id="_Path_8" data-name="<Path>" class="cls-1" x1="17" y1="6.24" x2="17" y2="9.06"/><rect id="_Rectangle_2" data-name="<Rectangle>" class="cls-2" x="11.26" y="9.07" width="11.65" height="13.27"/></g><g id="_Group_2" data-name="<Group>"><path id="_Path_9" data-name="<Path>" class="cls-2" d="M30.73,16.08l-.85-.47h0l-.62.18a1.17,1.17,0,0,0-.79,1.45h0A1.16,1.16,0,0,0,29.9,18l.63-.18"/><polyline id="_Path_10" data-name="<Path>" class="cls-1" points="24.58 14.48 25.65 17.88 28.42 17.19"/><path id="_Path_11" data-name="<Path>" class="cls-1" d="M22.91,10.61h1.27a1.95,1.95,0,1,1,0,3.89H22.91"/></g><g id="_Group_3" data-name="<Group>"><path id="_Path_12" data-name="<Path>" class="cls-1" d="M11.26,10.61H9.82a1.95,1.95,0,1,0,0,3.89h1.44"/><path id="_Path_13" data-name="<Path>" class="cls-2" d="M3.27,16.08l.85-.47h0l.62.18a1.17,1.17,0,0,1,.79,1.45h0A1.16,1.16,0,0,1,4.1,18l-.63-.18"/><polyline id="_Path_14" data-name="<Path>" class="cls-1" points="9.43 14.47 8.35 17.88 5.58 17.19"/></g></svg> </div> <div class="sidebar__title">Artificial Intelligence</div> </a> <a href="/category/industries/banking-financial-services/" title="Banking & Finance" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-bankingFinance</title><line class="cls-1" x1="19.93" y1="18.46" x2="23.45" y2="18.46"/><polyline class="cls-1" points="19.93 15.21 21.68 17.36 23.49 15.21"/><line class="cls-1" x1="21.68" y1="20.04" x2="21.68" y2="17.36"/><line class="cls-1" x1="12.78" y1="6.73" x2="12.78" y2="7.6"/><line class="cls-1" x1="12.78" y1="12.56" x2="12.78" y2="13.43"/><path class="cls-1" d="M11.22,12.05a2.45,2.45,0,0,0,1.46.5c.85,0,1.52-.42,1.52-1.25,0-1.63-2.86-.82-2.86-2.63,0-.65.56-1.06,1.52-1.06a2.37,2.37,0,0,1,1.45.51"/><line class="cls-1" x1="11.18" y1="23.91" x2="13.74" y2="23.91"/><path class="cls-1" d="M14.48,21.72a1.7,1.7,0,0,0-1.25-.52c-.86,0-1.56.4-1.56,1.36,0,.73.52,1.38.52,2.1a1.48,1.48,0,0,1-.92,1.48h3.26"/><circle class="cls-2" cx="17" cy="17" r="15.86"/><ellipse class="cls-2" cx="17" cy="17" rx="10.19" ry="15.86"/><line class="cls-3" x1="17" y1="1.14" x2="17" y2="32.86"/><line class="cls-3" x1="17" y1="17" x2="1.14" y2="17"/><line class="cls-3" x1="8.16" y1="9.07" x2="3.4" y2="9.07"/><line class="cls-3" x1="30.59" y1="9.07" x2="17.21" y2="9.07"/><line class="cls-3" x1="8.16" y1="24.92" x2="3.4" y2="24.92"/><line class="cls-3" x1="30.75" y1="24.93" x2="17.21" y2="24.93"/><line class="cls-3" x1="32.86" y1="17.01" x2="27.19" y2="17.01"/></svg> </div> <div class="sidebar__title">Banking & Finance</div> </a> <a href="/category/ciso-corner/" title="CISO" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><defs></defs><title>si-icon-topic-CISO</title><path class="cls-1" d="M8,28.29a9.11,9.11,0,0,1,7-8.83,5.15,5.15,0,1,1,4.17,0h.06a8.67,8.67,0,0,1,6.35,6.86,8.39,8.39,0,0,1,.23,2.07"/><path class="cls-2" d="M17,32.77A11.54,11.54,0,0,1,5.48,21.25V7L17,1.23,28.52,7V21.25A11.54,11.54,0,0,1,17,32.77Z"/></svg> </div> <div class="sidebar__title">CISO</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/cloud-protection/" title="Cloud Security" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-cloudSecurity</title><path class="cls-1" d="M8,27.38a7.94,7.94,0,1,1,4.08-15.22,7.9,7.9,0,0,1,15.06,2.93,6.16,6.16,0,0,1-.42,12.3H8Z"/></svg> </div> <div class="sidebar__title">Cloud Security</div> </a> <a href="/category/data-protection/" title="Data Protection" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-dataProtection</title><path class="cls-1" d="M25.59,16.88a10.32,10.32,0,1,1-4.36-3.68"/><circle class="cls-2" cx="17" cy="22.64" r="6.58"/><path class="cls-2" d="M23.58,22.64V7.6a6.58,6.58,0,1,0-13.16,0v15.5"/></svg> </div> <div class="sidebar__title">Data Protection</div> </a> <a href="/category/endpoint/" title="Endpoint" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-mobileSecurity</title><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="7.85" y="1.1" width="18.29" height="31.81" rx="1.31" ry="1.31"/><line id="_Path_" data-name="<Path>" class="cls-2" x1="7.85" y1="26.32" x2="26.15" y2="26.32"/><circle id="_Path_2" data-name="<Path>" cx="17" cy="29.88" r="1.24"/></svg> </div> <div class="sidebar__title">Endpoint</div> </a> <a href="/category/energy-utility/" title="Energy & Utility" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-energyUtility</title><path class="cls-1" d="M17,1.46a9.84,9.84,0,0,0-9.87,9.8,10.63,10.63,0,0,0,3.28,7.23c2.26,2.33,2.8,3.93,2.8,5.76v.5h7.58v-.5c0-1.83.54-3.43,2.8-5.76a10.63,10.63,0,0,0,3.28-7.23A9.84,9.84,0,0,0,17,1.46"/><line class="cls-1" x1="13.21" y1="29.92" x2="20.79" y2="29.92"/><line class="cls-1" x1="13.21" y1="27.29" x2="20.79" y2="27.29"/><line class="cls-1" x1="14.68" y1="32.54" x2="19.32" y2="32.54"/></svg> </div> <div class="sidebar__title">Energy & Utility</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/fraud-protection/" title="Fraud Protection" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-fraudProtection</title><g id="_Group_" data-name="<Group>"><path class="cls-1" d="M23.22,24.93H4A1.77,1.77,0,0,1,2.2,23.17V8.12A1.77,1.77,0,0,1,4,6.36H26.35a1.76,1.76,0,0,1,1.77,1.76v7.53"/></g><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="2.2" y="10.18" width="25.92" height="2.87"/><path class="cls-1" d="M28.12,27.64A3.68,3.68,0,0,1,24.45,24V19.42l3.67-1.84,3.68,1.84V24A3.68,3.68,0,0,1,28.12,27.64Z"/></svg> </div> <div class="sidebar__title">Fraud Protection</div> </a> <a href="/category/government/" title="Government" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-government</title><path class="cls-1" d="M1.14,17a4.84,4.84,0,0,0,9.68,0Z"/><circle class="cls-1" cx="17" cy="10.17" r="2.03"/><path class="cls-1" d="M14.47,31.93a2.53,2.53,0,0,1,5.06,0"/><polygon class="cls-1" points="5.98 7.95 10.82 17.01 1.14 17.01 5.98 7.95"/><path class="cls-1" d="M23.18,11.12a4.84,4.84,0,1,0,9.68,0Z"/><polygon class="cls-1" points="28.02 2.07 32.86 11.12 23.18 11.12 28.02 2.07"/><line class="cls-2" x1="5.98" y1="7.95" x2="28.02" y2="2.07"/><line class="cls-2" x1="17" y1="5.01" x2="17" y2="8.14"/><line class="cls-2" x1="17" y1="12.18" x2="17" y2="29.4"/><line class="cls-1" x1="25.92" y1="31.93" x2="7.35" y2="31.93"/></svg> </div> <div class="sidebar__title">Government</div> </a> <a href="/category/health-care/" title="Healthcare" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-hetitlehcare</title><circle cx="5.87" cy="17.07" r="0.52"/><circle class="cls-1" cx="5.87" cy="17.07" r="2.12"/><path class="cls-2" d="M21.8,21v4.22a7.82,7.82,0,0,1-8,7.68,7.85,7.85,0,0,1-8-7.68V19.25"/><path class="cls-1" d="M16.08,1.14H13.35V12.5a8.46,8.46,0,1,0,16.91,0V1.14H27.69"/></svg> </div> <div class="sidebar__title">Healthcare</div> </a> <a href="/category/identity-access/" title="Identity & Access" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-identityAccessManagement</title><path class="cls-1" d="M5.64,5.92A15.87,15.87,0,0,1,28.39,6"/><path class="cls-1" d="M28.85,10.87A14.2,14.2,0,0,0,17,4.46C10.37,4.46,6.57,8.52,4,12.38"/><path class="cls-1" d="M28.7,27c-2.08-.9-2.6-2.12-2.6-4.33,0-2.8.68-2.66.68-6.16,0-4.06-3.57-8.81-9.82-8.81-4.59,0-6.79,2.3-8.63,4.59-1.12,1.4-2.85,4.15-5.08,5.05"/><path class="cls-1" d="M3.25,21.66c3-1.09,5.44-3.81,7-6.4C11.54,13,13.77,10.87,17,10.87a6.62,6.62,0,0,1,6.61,6.44c0,2.68-.83,4.38-.83,6.3a5.92,5.92,0,0,0,4,5.93"/><path class="cls-1" d="M3.83,25.26A25.06,25.06,0,0,0,10.11,21c2.11-2.07,3.83-6.89,6.85-6.89a3.61,3.61,0,0,1,3.54,3.75c0,2.42-1.62,4.8-3.54,6.63a54,54,0,0,1-7.88,6.26"/><path class="cls-1" d="M17,18.15c-2.32,4.35-6.58,7.94-10.75,10.51"/><path class="cls-1" d="M12.17,32.11c.91-1.35,1.83-2.22,3.38-2.22a3,3,0,0,1,2.83,3"/><path class="cls-1" d="M19.77,25a5.91,5.91,0,0,0-.36,2,6,6,0,0,0,3.11,4.9"/><path class="cls-1" d="M29.86,13.24a10,10,0,0,1,.89,4.42,11.06,11.06,0,0,1-1.62,6.13"/></svg> </div> <div class="sidebar__title">Identity & Access</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/incident-response/" title="Incident Response" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-incidentResponse</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M26.19,32.36V25.68a9.19,9.19,0,0,0-7.06-8.94,5.24,5.24,0,1,0-4.26,0,9.19,9.19,0,0,0-7.06,8.94v6.68"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M15.35,6.88A5.24,5.24,0,1,0,8,11.67,9.19,9.19,0,0,0,.92,20.61"/><path id="_Path_3" data-name="<Path>" class="cls-1" d="M18.65,6.88A5.24,5.24,0,1,1,26,11.67a9.19,9.19,0,0,1,7.07,8.94"/><circle cx="17" cy="14.1" r="1.09"/><path class="cls-2" d="M22.09,10.71a4.61,4.61,0,0,1-4.24,3.39"/></svg> </div> <div class="sidebar__title">Incident Response</div> </a> <a href="/category/mainframe/" title="Mainframe" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-mainframe</title><rect id="_Rectangle_" data-name="<Rectangle>" class="cls-1" x="9.11" y="1.14" width="15.79" height="31.72"/><line id="_Path_" data-name="<Path>" class="cls-1" x1="12.88" y1="12.39" x2="21.12" y2="12.39"/><line id="_Path_2" data-name="<Path>" class="cls-1" x1="12.88" y1="8.64" x2="21.12" y2="8.64"/><line id="_Path_3" data-name="<Path>" class="cls-1" x1="12.88" y1="4.89" x2="21.12" y2="4.89"/><g id="_Group_" data-name="<Group>"><polyline id="_Path_4" data-name="<Path>" class="cls-2" points="24.89 4.89 32.86 4.89 32.86 29.11 24.89 29.11"/><line id="_Path_5" data-name="<Path>" class="cls-1" x1="24.9" y1="16.14" x2="29.02" y2="16.14"/><line id="_Path_6" data-name="<Path>" class="cls-1" x1="24.9" y1="12.39" x2="29.02" y2="12.39"/><line id="_Path_7" data-name="<Path>" class="cls-1" x1="24.9" y1="8.64" x2="29.02" y2="8.64"/></g><g id="_Group_2" data-name="<Group>"><polyline id="_Path_8" data-name="<Path>" class="cls-2" points="9.11 4.89 1.14 4.89 1.14 29.11 9.11 29.11"/><line id="_Path_9" data-name="<Path>" class="cls-1" x1="9.11" y1="16.14" x2="4.89" y2="16.14"/><line id="_Path_10" data-name="<Path>" class="cls-1" x1="9.11" y1="12.39" x2="4.89" y2="12.39"/><line id="_Path_11" data-name="<Path>" class="cls-1" x1="9.11" y1="8.64" x2="4.89" y2="8.64"/></g></svg> </div> <div class="sidebar__title">Mainframe</div> </a> <a href="/category/network/" title="Network" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-network</title><circle id="_Path_" data-name="<Path>" cx="4.22" cy="25.31" r="0.95"/><circle id="_Path_2" data-name="<Path>" cx="8.04" cy="25.31" r="0.95"/><circle id="_Path_3" data-name="<Path>" cx="11.86" cy="25.31" r="0.95"/><path id="_Path_4" data-name="<Path>" class="cls-1" d="M22.68,9a4.82,4.82,0,0,1,7,0"/><path id="_Path_5" data-name="<Path>" class="cls-1" d="M21.49,6.9a7.18,7.18,0,0,1,9.33,0"/><path id="_Path_6" data-name="<Path>" class="cls-1" d="M20.29,4.8A9.58,9.58,0,0,1,32,4.81"/><rect id="_Path_7" data-name="<Path>" class="cls-1" x="1.14" y="19.41" width="31.72" height="11.79" rx="1.69" ry="1.69"/><line id="_Path_8" data-name="<Path>" class="cls-1" x1="26.16" y1="19.41" x2="26.16" y2="11.09"/></svg> </div> <div class="sidebar__title">Network</div> </a> <a href="/category/industries/retail/" title="Retail" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-retail</title><path id="_Path_" data-name="<Path>" class="cls-1" d="M2,2H5.33l3,14.53c.55,2.14,1.48,3.17,3.2,3.17H27.86a2.39,2.39,0,0,0,2.63-2.25L32,6.31H9.55"/><path id="_Path_2" data-name="<Path>" class="cls-1" d="M6.65,8.39l2.69,13c.46,2.13,1.42,3.16,3.21,3.16H30"/><circle id="_Path_3" data-name="<Path>" class="cls-1" cx="12.35" cy="29.8" r="2.25"/><circle id="_Path_4" data-name="<Path>" class="cls-1" cx="26.31" cy="29.8" r="2.25"/></svg> </div> <div class="sidebar__title">Retail</div> </a> </div> </div> <div class="slide"> <div class="row"> <a href="/category/risk-management/" title="Risk Management" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-riskManagement</title><path class="cls-1" d="M6.36,32.86,9,28.29M22.17,5.67l2.64-4.53M7.6,30.72a16.07,16.07,0,0,0,21.83-5.81A15.78,15.78,0,0,0,23.58,3.25M28.75,17A13.16,13.16,0,1,0,15.59,30,13.11,13.11,0,0,0,28.75,17Z"/><path d="M19.5,24.29a.75.75,0,1,0-1,.27.76.76,0,0,0,1-.27"/><path d="M24.71,15.32a.75.75,0,0,0-.28-1,.76.76,0,0,0-1,.27.75.75,0,0,0,1.31.75"/><path d="M16.89,16.81a.74.74,0,0,0-.27-1,.76.76,0,0,0-1,.28.75.75,0,0,0,1.3.74"/><path d="M23.4,18.32a.75.75,0,0,0,1.31-.75.77.77,0,0,0-1-.27.75.75,0,0,0-.28,1"/><path d="M7.79,9.35a.75.75,0,0,0,1,.28.75.75,0,0,0,.28-1,.76.76,0,0,0-1-.28.74.74,0,0,0-.27,1"/><path d="M9.08,15.32a.74.74,0,0,0-.27-1,.76.76,0,0,0-1,.27.75.75,0,0,0,.28,1,.74.74,0,0,0,1-.27"/></svg> </div> <div class="sidebar__title">Risk Management</div> </a> <a href="/category/security-intelligence-analytics/" title="Security Intelligence & Analytics" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-securityAnalytics</title><circle id="_Path_" data-name="<Path>" class="cls-1" cx="17" cy="23" r="2.03"/><circle id="_Path_2" data-name="<Path>" class="cls-1" cx="26.04" cy="9.08" r="2.03"/><circle id="_Path_3" data-name="<Path>" class="cls-1" cx="7.84" cy="17.02" r="2.03"/><line id="_Path_4" data-name="<Path>" class="cls-2" x1="5.81" y1="17.01" x2="1.14" y2="17.01"/><line id="_Path_5" data-name="<Path>" class="cls-1" x1="32.86" y1="9.08" x2="28.26" y2="9.08"/><line id="_Path_6" data-name="<Path>" class="cls-2" x1="9.53" y1="18.15" x2="15.28" y2="21.92"/><line id="_Path_7" data-name="<Path>" class="cls-2" x1="18.08" y1="21.28" x2="25.01" y2="10.83"/><polyline class="cls-1" points="1.14 1.14 1.14 32.86 32.86 32.86"/></svg> </div> <div class="sidebar__title">Security Analytics</div> </a> <a href="/category/security-services/" title="Security Services" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 34"><title>si-icon-topic-securityServices</title><path class="cls-1" d="M19.54,3.68A2.54,2.54,0,1,0,17,6.23,2.54,2.54,0,0,0,19.54,3.68Z"/><path class="cls-1" d="M29.81,12.54a2.54,2.54,0,1,0-3.47-.93A2.55,2.55,0,0,0,29.81,12.54Z"/><path class="cls-1" d="M27.27,25.86a2.54,2.54,0,1,0-.93-3.47A2.54,2.54,0,0,0,27.27,25.86Z"/><path class="cls-1" d="M14.46,30.32A2.54,2.54,0,1,0,17,27.77,2.54,2.54,0,0,0,14.46,30.32Z"/><path class="cls-1" d="M4.19,21.46a2.54,2.54,0,1,0,3.47.93A2.55,2.55,0,0,0,4.19,21.46Z"/><path class="cls-1" d="M6.74,8.14a2.54,2.54,0,1,0,.93,3.47A2.56,2.56,0,0,0,6.74,8.14Z"/><line class="cls-2" x1="14.95" y1="4.81" x2="7.63" y2="9.02"/><line class="cls-2" x1="26.4" y1="24.93" x2="19.23" y2="29.07"/><line class="cls-2" x1="5.36" y1="12.87" x2="5.36" y2="21.13"/><line class="cls-2" x1="28.63" y1="12.87" x2="28.63" y2="21.1"/><line class="cls-2" x1="19.23" y1="4.92" x2="26.35" y2="9.01"/><line class="cls-2" x1="7.65" y1="25.01" x2="14.71" y2="29.23"/><line class="cls-2" x1="21.43" y1="19.56" x2="26.34" y2="22.39"/><line class="cls-2" x1="17" y1="11.88" x2="17" y2="6.22"/><line class="cls-2" x1="12.57" y1="19.56" x2="7.66" y2="22.39"/><polygon id="_Path_" data-name="<Path>" class="cls-2" points="17 11.88 21.43 14.44 21.43 19.56 17 22.12 12.57 19.56 12.57 14.44 17 11.88"/></svg> </div> <div class="sidebar__title">Security Services</div> </a> <a href="/category/threat-hunting/" title="Threat Hunting" class="link"> <div class="image"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34 31.97"><title>si-icon-topic-threatHunting</title><circle class="cls-1" cx="17" cy="15.98" r="15.03" transform="translate(-0.02 0.02) rotate(-0.06)"/><path class="cls-1" d="M6.9,16A10.1,10.1,0,1,1,17,26.08,10.1,10.1,0,0,1,6.9,16Z"/><path class="cls-1" d="M12,16a5,5,0,1,1,5,5A5,5,0,0,1,12,16Z"/><path d="M18.1,16a1.1,1.1,0,1,0-1.1,1.1A1.1,1.1,0,0,0,18.1,16"/></svg> </div> <div class="sidebar__title">Threat Hunting</div> </a> </div> </div> </amp-carousel> </div> <div id="close" class="name close" role="button" tabindex="1" on="tap:carousel.toggleClass(class='minimized'), accordion.toggleClass(class='minimized'), filter.toggleClass(class='arrow-up'), slides.goToSlide(index=0), close.toggleVisibility" hidden> Close <svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 512.001 512.001" style="enable-background:new 0 0 512.001 512.001;" xml:space="preserve"><g><g><path d="M284.286,256.002L506.143,34.144c7.811-7.811,7.811-20.475,0-28.285c-7.811-7.81-20.475-7.811-28.285,0L256,227.717L34.143,5.859c-7.811-7.811-20.475-7.811-28.285,0c-7.81,7.811-7.811,20.475,0,28.285l221.857,221.857L5.858,477.859c-7.811,7.811-7.811,20.475,0,28.285c3.905,3.905,9.024,5.857,14.143,5.857c5.119,0,10.237-1.952,14.143-5.857L256,284.287l221.857,221.857c3.905,3.905,9.024,5.857,14.143,5.857s10.237-1.952,14.143-5.857c7.811-7.811,7.811-20.475,0-28.285L284.286,256.002z"/></g></g></svg> </div> </div> </div> </div> <!-- REPOSITION SCROLL-TO-TOP --> <style> @media (max-width: 959.98px) { #topics-sidebar { z-index: 99; } .scroll-to-top .scroll-to-top__button { /* top: calc(100vh - 94px) */ } } </style> <!-- REPOSITION SIDEBAR IF PLAYER EXISTS --> </aside> <!--SI Newsletters --> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.31.0-rc.0/cta-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/cta-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/next/cta-section.min.js"></script> <div style="background-color: #161616;"> <dds-cta-section data-autoid="dds--cta-section" children-custom-class="" class="container SI_padding"> <dds-cta-block no-border="" data-autoid="dds--cta-block"> <dds-content-block-heading class="copy" role="heading" aria-level="2" data-autoid="dds--content-block__heading" slot="heading"> <h2 >Topic updates</h2> </dds-content-block-heading> <dds-content-block-copy data-autoid="dds--content-block__copy" size="md" slot="copy"> <dds-content-block-paragraph data-autoid="dds--content-block-paragraph" class="copy"> Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research. </dds-content-block-paragraph> <div role="list" class="list_newletter"> <dds-button-cta data-autoid="dds-cta" cta-style="button" class="copy" cta-type="local" href="https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-51966" kind="primary" icon-layout="" size=""> Subscribe today </dds-button-cta> </div> </dds-content-block-copy> </dds-cta-block> </dds-cta-section> </div> <dds-footer-container></dds-footer-container> <script> document.addEventListener('DOMContentLoaded', () => { const boxstyle = document.querySelector('.button2'); const removePadding = document.querySelector('dds-cta-section'); if (boxstyle) { const shadowRoot = boxstyle.shadowRoot; const bxContentSsectionDOM = shadowRoot.querySelector('.bx--btn'); if (bxContentSsectionDOM) { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.addEventListener('mouseover', () => { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.style.backgroundColor = 'rgba(141, 141, 141, 0.16)'; // }); // when mouse leave the element bxContentSsectionDOM.addEventListener('mouseout', () => { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.style.backgroundColor = 'transparent'; // Reset background color }); } } if(removePadding){ const shadowRoot = removePadding.shadowRoot; const removespace = shadowRoot.querySelector('.bx--content-section__leading'); if(removespace){ removespace.style.display = 'none'; } } }); document.querySelector("dds-footer-container").size = 'default'; //Uncomment this to add a custom links. // document.querySelector("dds-footer-container").adjunctLinks = [{ // 'title': 'IBM Custom Link', // 'link': 'https://ibm.com' // }, // { // 'title': 'IBM Custom Link2', // 'link': 'https://ibm.com' // } // ]; </script> <!--SI close Newsletters--> <div style="background-color: #13171a;"> <div class="container"> <!-- FOOTER --> <section id="footer" class="footer"> <!-- LOGO --> <div class="footer__logo"> <amp-img width="280" height="31" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/logo-white.svg" alt="Security Intelligence"></amp-img> </div> <!-- COPY --> <div class="footer__copy"><p>Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.</p> </div> <!-- LINKS --> <div class="footer__list"> <a href="/news/" class="footer__link">Cybersecurity News</a> <a href="/category/topics/" class="footer__link">By Topic</a> <a href="/category/industries/" class="footer__link">By Industry</a> <a href="/series/" class="footer__link">Exclusive Series</a> <a href="/x-force/" class="footer__link">X-Force</a> <a href="/media/" class="footer__link">Podcast</a> <a href="/events/" class="footer__link">Events</a> <a href="/about-us/" class="footer__link">Contact</a> <a href="/about-us/" class="footer__link">About Us</a> </div> <!-- SOCIAL NETWORKS --> <div class="footer__social-networks"> <div class="headline">Follow us on social</div> <a href="http://www.twitter.com/ibmsecurity" aria-label="Twitter" class="footer__icon" style="left:-4px;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M24 4.557c-.883.392-1.832.656-2.828.775 1.017-.609 1.798-1.574 2.165-2.724-.951.564-2.005.974-3.127 1.195-.897-.957-2.178-1.555-3.594-1.555-3.179 0-5.515 2.966-4.797 6.045-4.091-.205-7.719-2.165-10.148-5.144-1.29 2.213-.669 5.108 1.523 6.574-.806-.026-1.566-.247-2.229-.616-.054 2.281 1.581 4.415 3.949 4.89-.693.188-1.452.232-2.224.084.626 1.956 2.444 3.379 4.6 3.419-2.07 1.623-4.678 2.348-7.29 2.04 2.179 1.397 4.768 2.212 7.548 2.212 9.142 0 14.307-7.721 13.995-14.646.962-.695 1.797-1.562 2.457-2.549z" /> </svg> </a> <a href="http://www.linkedin.com/company/ibm-security" aria-label="LinkedIn" class="footer__icon" style="justify-self: center;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M4.98 3.5c0 1.381-1.11 2.5-2.48 2.5s-2.48-1.119-2.48-2.5c0-1.38 1.11-2.5 2.48-2.5s2.48 1.12 2.48 2.5zm.02 4.5h-5v16h5v-16zm7.982 0h-4.968v16h4.969v-8.399c0-4.67 6.029-5.052 6.029 0v8.399h4.988v-10.131c0-7.88-8.922-7.593-11.018-3.714v-2.155z" /> </svg> </a> <a href="https://www.youtube.com/@IBMTechnology" aria-label="YouTube" class="footer__icon" style="justify-self: end;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M19.615 3.184c-3.604-.246-11.631-.245-15.23 0-3.897.266-4.356 2.62-4.385 8.816.029 6.185.484 8.549 4.385 8.816 3.6.245 11.626.246 15.23 0 3.897-.266 4.356-2.62 4.385-8.816-.029-6.185-.484-8.549-4.385-8.816zm-10.615 12.816v-8l8 3.993-8 4.007z" /> </svg> </a> </div> </section> </div> </div> <div style="background-color:black"> <div class="container"> <!-- UTILITIES BAR --> <section class="utility_bar"> <!-- LINKS --> <div class="utility_bar__links" aria-label="Footer Navigation"> <a href="http://www.ibm.com?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">© 2024 IBM</a> <a href="https://www.ibm.com/contact/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Contact</a> <a href="https://www.ibm.com/privacy/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Privacy</a> <a href="https://www.ibm.com/legal/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US&cm_mc_uid=03001744655915532865554&cm_mc_sid_50200000=84159441565120380187" target="_blank" rel="noopener, noreferrer">Terms of use</a> <a href="https://www.ibm.com/accessibility/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Accessibility</a> <a href="#" onclick="truste.eu.clickListener();return false;" target="_blank" rel="noopener, noreferrer">Cookie Preferences</a> </div> <!-- Sponsor credits --> <div class="utility_bar__sponsor"> <a href="http://ibm.com/security?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" data-icon="B" class="icon ibm" rel="noopener, noreferrer" style="padding-right:0px"> <span>Sponsored by <svg id="Layer_1" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 31.97 14.06"> <defs> <style> .cls-1 { fill: #fff; } </style> </defs> <title>si-icon-eightbarfeature</title> <path class="cls-1" d="M27.17,12.6h4.21v.84H27.17Zm0-1.68h4.21v.84H27.17Zm0-1.68h2.52v.84H27.17Zm0-1.69h2.52V8.4H27.17Zm0-1.68h2.52v.84H27.17Zm-.84-4.2.28-.85h4.77v.85Zm-.56,1.68.29-.84h5.32v.84ZM25.22,5l.28-.84h4.19V5Zm-.56,1.68L25,5.87h2.22l-.27.84Zm0,6.73-.28-.84H25Zm-.55-1.68-.29-.84H25.5l-.28.84Zm-.56-1.68-.27-.84H26l-.27.84ZM23,8.4l-.29-.85h3.9l-.28.85Zm-.57-1.69-.27-.84h2.22l.28.84Zm-2.8,2.53h2.53v.84H19.63Zm0-1.69h2.53V8.4H19.63Zm0-1.68h2.53v.84H19.63Zm0-.84V4.19h4.19l.29.84ZM18,12.6h4.21v.84H18Zm0-1.68h4.21v.84H18Zm0-7.57V2.51h5.32l.28.84Zm0-1.68V.82h4.76l.29.85ZM14.16,9.24H17a2.23,2.23,0,0,1,.07.37,2.49,2.49,0,0,1,0,.47H14.16Zm0-5h2.95a2.38,2.38,0,0,1,0,.46A2.18,2.18,0,0,1,17,5H14.16ZM9.11,9.24h2.52v.84H9.11Zm0-1.69H16a5,5,0,0,1,.4.4,2,2,0,0,1,.32.45H9.11Zm0-1.68h7.57a2,2,0,0,1-.32.45,4.89,4.89,0,0,1-.4.39H9.11Zm0-1.68h2.52V5H9.11ZM7.42,12.6H16a3.09,3.09,0,0,1-1,.62,3.73,3.73,0,0,1-1.32.22H7.42Zm0-1.68H17a2.47,2.47,0,0,1-.15.46,2.24,2.24,0,0,1-.21.38H7.42Zm0-8.41h9.22a1.91,1.91,0,0,1,.21.38,2.47,2.47,0,0,1,.15.46H7.42Zm0-1.69H13.6a3.73,3.73,0,0,1,1.32.23,3.09,3.09,0,0,1,1,.62H7.42Zm-5,8.42H4.9v.84H2.38Zm0-1.69H4.9V8.4H2.38Zm0-1.68H4.9v.84H2.38Zm0-1.68H4.9V5H2.38ZM.69,12.6H6.58v.84H.69Zm0-1.68H6.58v.84H.69Zm0-8.41H6.58v.84H.69ZM.69.82H6.58v.85H.69Z" /> </svg> </span> </a> </div> </section> </div> </div> <script> window._appInfo = window._appInfo || {}; window._appInfo.newsCredAPIKey = "YXJ0aWNsZT0yM2ViMWM5MjgxNGYxMWVkYjU3NzFlMzE2YzViYjVlNg=="; </script> <!-- FOOTER SCRIPTS --> <script type="text/javascript" id="qppr_frontend_scripts-js-extra"> /* <![CDATA[ */ var qpprFrontData = {"linkData":{"https:\/\/securityintelligence.com\/defining-security-intelligence\/":[0,0,"https:\/\/securityintelligence.com\/defintion-security-intelligence\/#.VS_NwpNnuZA"],"https:\/\/securityintelligence.com\/security-vulnerability-management-its-about-outcomes-not-activity\/":[0,0,""]},"siteURL":"https:\/\/securityintelligence.com","siteURLq":"https:\/\/securityintelligence.com"}; /* ]]> */ </script> <script type="text/javascript" src="https://securityintelligence.com/wp-content/plugins/quick-pagepost-redirect-plugin/js/qppr_frontend_script.min.js?ver=5.2.4" id="qppr_frontend_scripts-js"></script> <script> setTimeout(() => { document.querySelector(".related_content").style.visibility = 'visible'; document.querySelector(".related_content.article.article_grid.article__mobile--card.article--IBM_blog > c4d-card > c4d-card-footer").shadowRoot.querySelector("#link").style.justifyContent = 'flex-start'; }, 100); </script> </body> </html>