Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants […]

The post Bridging the 3.4 Million Workforce Gap in Cybersecurity appeared first on Security Intelligence.

Continue reading Bridging the 3.4 Million Workforce Gap in Cybersecurity

People, Process and Technology: The Incident Response Trifecta

Let’s say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for investment, your budget has been approved and expanded. With your newfound wealth, you focus on acquiring technology that will improve your monitoring, detection and analysis […]

The post People, Process and Technology: The Incident Response Trifecta appeared first on Security Intelligence.

Continue reading People, Process and Technology: The Incident Response Trifecta

What Can We Learn From Recent Cyber History?

The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes with losses of more than a million dollars, this list reveals broader trends in cybersecurity for the past two decades. And, of course, there are […]

The post What Can We Learn From Recent Cyber History? appeared first on Security Intelligence.

Continue reading What Can We Learn From Recent Cyber History?

What CISOs Should Know About CIRCIA Incident Reporting

In March of 2022, a new federal law was adopted: the Cyber Incident Reporting Critical Infrastructure Act (CIRCIA). This new legislation focuses on reporting requirements related to cybersecurity incidents and ransomware payments. The key takeaway: covered entities in critical infrastructure will now be required to report incidents and payments within specified time frames to the […]

The post What CISOs Should Know About CIRCIA Incident Reporting appeared first on Security Intelligence.

Continue reading What CISOs Should Know About CIRCIA Incident Reporting

Tech Stack Diversity: Security Benefits and Costs

If your remit protects the information technology estate, you might be tired of the constant fire drills and reminders of upcoming disruptions. The barrage from cybersecurity vendors claiming “we have the solution” is almost equally exhausting. Start here: there is no magic bullet cybersecurity solution. If there was, its inventor would be a gazillionaire and […]

The post Tech Stack Diversity: Security Benefits and Costs appeared first on Security Intelligence.

Continue reading Tech Stack Diversity: Security Benefits and Costs

A Day in the Life: Working in Cyber Incident Response

As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s […]

The post A Day in the Life: Working in Cyber Incident Response appeared first on Security Intelligence.

Continue reading A Day in the Life: Working in Cyber Incident Response

Digital Transformation and Risk Management Must Go Together

The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating:  Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in the labor and supply markets Geopolitical risk is on the rise New regulations, including an […]

The post Digital Transformation and Risk Management Must Go Together appeared first on Security Intelligence.

Continue reading Digital Transformation and Risk Management Must Go Together

What Kind of Data Costs Most in a Breach?

Today’s most valuable currency is data. Breaches, information operations, analytics and behavior recognition are all driven by data and the desire to possess it, regardless of what those who possess it want to do with it. We set out to answer the question “What kind of data costs the most in a breach?” As it […]

The post What Kind of Data Costs Most in a Breach? appeared first on Security Intelligence.

Continue reading What Kind of Data Costs Most in a Breach?

What Should Customers Ask Managed Service Providers?

Managed service providers (MSPs), sometimes called managed security services (MSS) or MSSP, play a very important role in protecting data and other digital assets and will continue to do so. Some of the benefits include, but are not limited to: Mostly predictable costs, including less burden on capital expenditure, and pay-as-you-go models Dedicated and informed […]

The post What Should Customers Ask Managed Service Providers? appeared first on Security Intelligence.

Continue reading What Should Customers Ask Managed Service Providers?

Prepare for Quantum Encryption Today

Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in smoke. With every tool that could change the world comes questions of scale and mass […]

The post Prepare for Quantum Encryption Today appeared first on Security Intelligence.

Continue reading Prepare for Quantum Encryption Today