Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. […]

The post Resilient Companies Have a Disaster Recovery Plan appeared first on Security Intelligence.

Continue reading Resilient Companies Have a Disaster Recovery Plan

Building Effective Business Cases to Cover Cybersecurity Costs

With the global average cost of a data breach totaling $3.86 million in 2020, the topic of security continues to be a major pressure point and a board-level agenda item. So why do security programs still seem to lack adequate funding, urgency and support until a breach or lawsuit occurs or auditors demand change? Verizon’s […]

The post Building Effective Business Cases to Cover Cybersecurity Costs appeared first on Security Intelligence.

Continue reading Building Effective Business Cases to Cover Cybersecurity Costs

Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan

A thorough exit plan that accounts for security during the transition from a cloud provider partnership is crucial to the integrity of your enterprise data.

The post Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan appeared first on Security Intelligence.

Continue reading Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan

Does Your Cloud Vendor Contract Include These Crucial Security Requirements?

Failing to negotiate security requirements into cloud vendor contracts can result in a lack of transparency and formally defined accountability for data security.

The post Does Your Cloud Vendor Contract Include These Crucial Security Requirements? appeared first on Security Intelligence.

Continue reading Does Your Cloud Vendor Contract Include These Crucial Security Requirements?

Security Considerations for Whatever Cloud Service Model You Adopt

Regardless of what cloud service model you adopt, it’s important to consider security implications related to application development, data and contract management, and IT asset governance.

The post Security Considerations for Whatever Cloud Service Model You Adopt appeared first on Security Intelligence.

Continue reading Security Considerations for Whatever Cloud Service Model You Adopt

How to Build a System Hardening Program From the Ground Up

System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.

The post How to Build a System Hardening Program From the Ground Up appeared first on Security Intelligence.

Continue reading How to Build a System Hardening Program From the Ground Up

The System Development Life Cycle: A Phased Approach to Application Security

By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

Continue reading The System Development Life Cycle: A Phased Approach to Application Security

What’s Holding Back GDPR Compliance Efforts?

Organizations can fast-track their GDPR compliance efforts by focusing on three crucial areas: awareness and understanding; accountability and responsibility; and resources and support.

The post What’s Holding Back GDPR Compliance Efforts? appeared first on Security Intelligence.

Continue reading What’s Holding Back GDPR Compliance Efforts?

The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.

The post The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader appeared first on Security Intelligence.

Continue reading The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement

Security leaders should infuse positive reinforcement into their security awareness and training programs to encourage users to adopt best practices.

The post CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement appeared first on Security Intelligence.

Continue reading CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement