Healthcare Needs Cybersecurity Pros that Anticipate What Threat Actors Will Do Next [Q&A with Dr. Rebecca Wynn]

By many measures, Rebecca Wynn is an accomplished cybersecurity leader. For example, she holds multiple graduate degrees, including an MBA and a doctorate…
The post Healthcare Needs Cybersecurity Pros that Anticipate What Threat Actors Will Do Next [… Continue reading Healthcare Needs Cybersecurity Pros that Anticipate What Threat Actors Will Do Next [Q&A with Dr. Rebecca Wynn]

14 Reasons Professionals Give for Why Network Security is Getting Harder

A survey found most cybersecurity professionals think the function of network security is getting harder. The survey also asked them “Why?” and here are their answers.
The post 14 Reasons Professionals Give for Why Network Security is Getti… Continue reading 14 Reasons Professionals Give for Why Network Security is Getting Harder

What the Top 25% of Cybersecurity Pros do Differently in Strategy, Risk and Communication

A benchmarking study found the top cybersecurity pros tend to be better aligned with business strategy, take a risk-based approach and communicate with leaders effectively.
The post What the Top 25% of Cybersecurity Pros do Differently in Strategy, Ris… Continue reading What the Top 25% of Cybersecurity Pros do Differently in Strategy, Risk and Communication

Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies.
The post Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale appeared first on Se… Continue reading Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

6 Common Flaws that Can Emerge in a Network Security Strategy Over Time

As networks grow and evolve the change introduces new security flaws in the defenses. Here are six of the common flaws we see in our day-to-day work.
The post 6 Common Flaws that Can Emerge in a Network Security Strategy Over Time appeared first on Sec… Continue reading 6 Common Flaws that Can Emerge in a Network Security Strategy Over Time

Aligning Security with Patient Safety: 8 Insights for Healthcare Cybersecurity by Healthcare Cybersecurity Pros

The chances, of shoring up healthcare cybersecurity with budget and staff, improve when security goals are aligned with healthcare goals, like patient safety.
The post Aligning Security with Patient Safety: 8 Insights for Healthcare Cybersecurity by He… Continue reading Aligning Security with Patient Safety: 8 Insights for Healthcare Cybersecurity by Healthcare Cybersecurity Pros

3 Ways Cloud Adoption is Changing the Role of the CISO

The enterprise adoption of the cloud is changing the role of the CISO, including the reporting structure, responsibilities and skill sets required for the job.
The post 3 Ways Cloud Adoption is Changing the Role of the CISO appeared first on Security B… Continue reading 3 Ways Cloud Adoption is Changing the Role of the CISO

5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

DNS manipulation, domain fronting, targeted cloud individual attacks, HTTPS and encryption, and the exploitation of hardware features are among the emerging challenges adversaries can exploit according to cybersecurity experts at SANS.
The post 5 Emerg… Continue reading 5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

Study Highlights Key Cloud Security Considerations as Hybrid Environments Add Complexity to Enterprise Networks

Enterprises are increasingly adopting the cloud, yet this is introducing new challenges including confusion about security responsibilities and the visibility necessary to protect both the cloud and hybrid environments.
The post Study Highlights Key Cl… Continue reading Study Highlights Key Cloud Security Considerations as Hybrid Environments Add Complexity to Enterprise Networks

Why People Who Protect Others Need to be at Their Best; Tackling Mental Health in Cybersecurity [Q&A with Dr. Ryan Louie, MD, Ph.D.]

People that protect others have to be at their best, which is why mental health in cybersecurity is so important; this requires safety, openness, and leadership according to Dr. Ryan Louie, MD, Ph.D.
The post Why People Who Protect Others Need to be at… Continue reading Why People Who Protect Others Need to be at Their Best; Tackling Mental Health in Cybersecurity [Q&A with Dr. Ryan Louie, MD, Ph.D.]