Here’s What You Need to Know to Secure Your IoT Projects

Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.

The post Here’s What You Need to Know to Secure Your IoT Projects appeared first on Security Intelligence.

Continue reading Here’s What You Need to Know to Secure Your IoT Projects

Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More

Intelligent access certification helps security teams improve visibility into access, prioritize compliance tasks with risk-based insights and make better decisions with actionable intelligence.

The post Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More appeared first on Security Intelligence.

Continue reading Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More

Insights From European Customers on Cybersecurity and Security Awareness

Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.

The post Insights From European Customers on Cybersecurity and Security Awareness appeared first on Security Intelligence.

Continue reading Insights From European Customers on Cybersecurity and Security Awareness

Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage

With support from IBM, the University of Bari Aldo Moro in Italy is developing a curriculum to help students develop the cybersecurity skills they need to work in a security operations center (SOC).

The post Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage appeared first on Security Intelligence.

Continue reading Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

The post How Can We Make Smart Cities Even Smarter? Start With Security Intelligence appeared first on Security Intelligence.

Continue reading How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

The post Best Practices for Designing a Security Operations Center appeared first on Security Intelligence.

Continue reading Best Practices for Designing a Security Operations Center

A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.

The post A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity appeared first on Security Intelligence.

Continue reading A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

What to Do When a Memory Corruption on an Input String Generates a DoS

When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.

The post What to Do When a Memory Corruption on an Input String Generates a DoS appeared first on Security Intelligence.

Continue reading What to Do When a Memory Corruption on an Input String Generates a DoS

Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

New security standards around open banking focus on multifactor authentication and monitoring of transactions but largely ignore device security.

The post Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions appeared first on Security Intelligence.

Continue reading Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

Securing Mobile Transactions and Payments in the Age of Connected Devices

Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.

The post Securing Mobile Transactions and Payments in the Age of Connected Devices appeared first on Security Intelligence.

Continue reading Securing Mobile Transactions and Payments in the Age of Connected Devices