Security Automation: The Future of Enterprise Defense

When it comes to giving cyber security experts the tools they need to take action, automation and machine learning (ML) can make a big difference. Many companies are working with high volumes of data, and types and variants of attack are always growing and changing. It can become too much for people to process in […]

The post Security Automation: The Future of Enterprise Defense appeared first on Security Intelligence.

Continue reading Security Automation: The Future of Enterprise Defense

How is Enterprise Security Like Writing a Novel?

Pen, paper and ink alone do not make a novel. In the same way, anti-malware, firewalls and SIEM tools alone do not make an enterprise secure. Too many organizations think that buying lots of security solutions and deploying them will make them secure. However, just having a security tool running does not make an enterprise […]

The post How is Enterprise Security Like Writing a Novel? appeared first on Security Intelligence.

Continue reading How is Enterprise Security Like Writing a Novel?

How a Cybersecurity Training Program Can Recruit From Inside Your Business

The cybersecurity industry is facing a shortage of trained and experienced professionals. Schools, universities and organizations are doing amazing things to encourage the next generation to pursue a cybersecurity career. However, there is still a huge cybersecurity talent shortage. With the right training, this can change. It is clear that organizations require cybersecurity training for […]

The post How a Cybersecurity Training Program Can Recruit From Inside Your Business appeared first on Security Intelligence.

Continue reading How a Cybersecurity Training Program Can Recruit From Inside Your Business

How to Secure Microservices Architecture

The use of microservices-based architecture to realize complex, evolving solutions is growing in popularity. Microservices make it much easier to replace or upgrade components mid-flight. It also allows multiple developers to work on different aspects of the overall solution without affecting each other.  However, microservices architecture comes with its own security challenges. Someone who might […]

The post How to Secure Microservices Architecture appeared first on Security Intelligence.

Continue reading How to Secure Microservices Architecture

What Is the Role of SIEM in the Fusion Center Era?

A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.

The post What Is the Role of SIEM in the Fusion Center Era? appeared first on Security Intelligence.

Continue reading What Is the Role of SIEM in the Fusion Center Era?

Speak the Board’s Language to Communicate the Value of Security

CISOs around the world complain that their board won’t allocate the necessary cybersecurity investment to keep the company safe. Part of the problem might be how we communicate the value of security.

The post Speak the Board’s Language to Communicate the Value of Security appeared first on Security Intelligence.

Continue reading Speak the Board’s Language to Communicate the Value of Security

Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence

Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence

The First Rule of Security Club: Don’t Talk About Security

The first rule about Security Club is don’t talk about security — or, at least, don’t let security initiatives get in the way of delivering business value.

The post The First Rule of Security Club: Don’t Talk About Security appeared first on Security Intelligence.

Continue reading The First Rule of Security Club: Don’t Talk About Security