A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Despite ever-growing investments in security tools, the risk of a data breach remains unacceptably high. This is the starting point of a strong a business case for investing in threat intelligence.

The post A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value appeared first on Security Intelligence.

Continue reading A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud

During the busy holiday shopping season, retailers must make decisions about e-commerce fraud rapidly to keep pace with demanding delivery schedules.

The post Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud appeared first on Security Intelligence.

Continue reading Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud

Security Monitoring and Analytics: Moving Beyond the SIEM

A platform approach to security monitoring empowers analysts to take their SIEM to the next level with advanced threat detection and response capabilities.

The post Security Monitoring and Analytics: Moving Beyond the SIEM appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: Moving Beyond the SIEM

Security Monitoring and Analytics: Faster Time to Action

Security monitoring and analytics platforms deliver business value by reducing the time it takes to identify, investigate and remediate threats.

The post Security Monitoring and Analytics: Faster Time to Action appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: Faster Time to Action

Security Monitoring and Analytics: From Tools to Platforms

An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.

The post Security Monitoring and Analytics: From Tools to Platforms appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: From Tools to Platforms

Cybersecurity Leadership in Transition: A View From the Classroom

Cybersecurity leadership courses traditionally focus on imparting subject matter expertise, but the next generation of CISOs must also be trusted advisors.

The post Cybersecurity Leadership in Transition: A View From the Classroom appeared first on Security Intelligence.

Continue reading Cybersecurity Leadership in Transition: A View From the Classroom

Keep Yourself and Your Organization Better Informed About Cybersecurity Trends

IT professionals must stay informed and educate the users in their networks about the latest cybersecurity trends and threats.

The post Keep Yourself and Your Organization Better Informed About Cybersecurity Trends appeared first on Security Intelligence.

Continue reading Keep Yourself and Your Organization Better Informed About Cybersecurity Trends

Health Care Security in 2016: End-of-Year Checkup on Security Trends

Upon reviewing the state of health care security in 2016, data revealed that the sector suffered nearly every type of common attack at an increased rate.

The post Health Care Security in 2016: End-of-Year Checkup on Security Trends appeared first on Security Intelligence.

Continue reading Health Care Security in 2016: End-of-Year Checkup on Security Trends

Four Characteristics of Top-Notch Threat Intelligence

Threat intelligence is a hot topic these days and was arguably one of the top themes of RSA Conference 2016. However, organizations need to realize that simply having more data about the latest threats, vulnerabilities, and exploits is not the answer to all their cybersecurity problems. On the contrary, threat intelligence is only helpful if…

The post Four Characteristics of Top-Notch Threat Intelligence appeared first on Speaking of Security – The RSA Blog.

Continue reading Four Characteristics of Top-Notch Threat Intelligence

The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?

Advanced ransomware—malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release—is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining distributed denial-of-service…

The post The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files? appeared first on Speaking of Security – The RSA Blog.

Continue reading The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?