What CISOs Should Know About CIRCIA Incident Reporting

In March of 2022, a new federal law was adopted: the Cyber Incident Reporting Critical Infrastructure Act (CIRCIA). This new legislation focuses on reporting requirements related to cybersecurity incidents and ransomware payments. The key takeaway: covered entities in critical infrastructure will now be required to report incidents and payments within specified time frames to the […]

The post What CISOs Should Know About CIRCIA Incident Reporting appeared first on Security Intelligence.

Continue reading What CISOs Should Know About CIRCIA Incident Reporting

Tech Stack Diversity: Security Benefits and Costs

If your remit protects the information technology estate, you might be tired of the constant fire drills and reminders of upcoming disruptions. The barrage from cybersecurity vendors claiming “we have the solution” is almost equally exhausting. Start here: there is no magic bullet cybersecurity solution. If there was, its inventor would be a gazillionaire and […]

The post Tech Stack Diversity: Security Benefits and Costs appeared first on Security Intelligence.

Continue reading Tech Stack Diversity: Security Benefits and Costs

A Day in the Life: Working in Cyber Incident Response

As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s […]

The post A Day in the Life: Working in Cyber Incident Response appeared first on Security Intelligence.

Continue reading A Day in the Life: Working in Cyber Incident Response

Digital Transformation and Risk Management Must Go Together

The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating:  Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in the labor and supply markets Geopolitical risk is on the rise New regulations, including an […]

The post Digital Transformation and Risk Management Must Go Together appeared first on Security Intelligence.

Continue reading Digital Transformation and Risk Management Must Go Together

What Kind of Data Costs Most in a Breach?

Today’s most valuable currency is data. Breaches, information operations, analytics and behavior recognition are all driven by data and the desire to possess it, regardless of what those who possess it want to do with it. We set out to answer the question “What kind of data costs the most in a breach?” As it […]

The post What Kind of Data Costs Most in a Breach? appeared first on Security Intelligence.

Continue reading What Kind of Data Costs Most in a Breach?

What Should Customers Ask Managed Service Providers?

Managed service providers (MSPs), sometimes called managed security services (MSS) or MSSP, play a very important role in protecting data and other digital assets and will continue to do so. Some of the benefits include, but are not limited to: Mostly predictable costs, including less burden on capital expenditure, and pay-as-you-go models Dedicated and informed […]

The post What Should Customers Ask Managed Service Providers? appeared first on Security Intelligence.

Continue reading What Should Customers Ask Managed Service Providers?

Prepare for Quantum Encryption Today

Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in smoke. With every tool that could change the world comes questions of scale and mass […]

The post Prepare for Quantum Encryption Today appeared first on Security Intelligence.

Continue reading Prepare for Quantum Encryption Today

Incident Response for Health Care IT: Differences and Drivers

Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted for 39% of all health […]

The post Incident Response for Health Care IT: Differences and Drivers appeared first on Security Intelligence.

Continue reading Incident Response for Health Care IT: Differences and Drivers

Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?   Difficulties and Positive Changes   The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finally) increasing (good) University degree mandates […]

The post Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty appeared first on Security Intelligence.

Continue reading Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

How to Make Business Practices That Support Cybersecurity Response

Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more common form, “The best-laid plans of mice and men often go awry.”   This saying may resonate with incident responders, business continuity planners and crisis managers. […]

The post How to Make Business Practices That Support Cybersecurity Response appeared first on Security Intelligence.

Continue reading How to Make Business Practices That Support Cybersecurity Response