Incident Response for Health Care IT: Differences and Drivers

Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted for 39% of all health […]

The post Incident Response for Health Care IT: Differences and Drivers appeared first on Security Intelligence.

Continue reading Incident Response for Health Care IT: Differences and Drivers

Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?   Difficulties and Positive Changes   The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finally) increasing (good) University degree mandates […]

The post Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty appeared first on Security Intelligence.

Continue reading Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

How to Make Business Practices That Support Cybersecurity Response

Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more common form, “The best-laid plans of mice and men often go awry.”   This saying may resonate with incident responders, business continuity planners and crisis managers. […]

The post How to Make Business Practices That Support Cybersecurity Response appeared first on Security Intelligence.

Continue reading How to Make Business Practices That Support Cybersecurity Response

To Retain Cybersecurity Employees, Know What Drives Them

COVID-19 may have given cybersecurity talent retention an artificial prop up over the last two years. For example, job satisfaction was on a downward trend from 2018 to 2019, but with the pandemic came a plateau in 2020 and 2021. Was the plateau due to newfound satisfaction or were there other factors, such as economic […]

The post To Retain Cybersecurity Employees, Know What Drives Them appeared first on Security Intelligence.

Continue reading To Retain Cybersecurity Employees, Know What Drives Them

Avoiding the Unintended Consequences of Strict Cybersecurity Policies

Does the left hand know what the right hand is doing? Or does even the left pinky know what the left ring finger is doing? Problems can easily arise when policies, including cybersecurity ones, end up being out of sync with business, technical, legal or regulatory requirements. The situation becomes even more severe when policy […]

The post Avoiding the Unintended Consequences of Strict Cybersecurity Policies appeared first on Security Intelligence.

Continue reading Avoiding the Unintended Consequences of Strict Cybersecurity Policies

What Do Financial Institutions Need to Know About the SEC’s Proposed Cybersecurity Rules?

On March 9, the U.S. Securities and Exchange Commission (SEC) announced a new set of proposed rules for cybersecurity risk management, strategy and incident disclosure for public companies. One intent of the rule changes is to provide “consistent, comparable and decision-useful” information to investors. Not yet adopted, these new rules – published in the Federal […]

The post What Do Financial Institutions Need to Know About the SEC’s Proposed Cybersecurity Rules? appeared first on Security Intelligence.

Continue reading What Do Financial Institutions Need to Know About the SEC’s Proposed Cybersecurity Rules?

Data Fabric: What It Is and How It Impacts Cybersecurity

Data use and generation today are both awesome and daunting to manage. What is the best way to manage this mountain of dispersed and disparate data? A possible answer lies in the concept of ‘data fabric’ as a means to unify data. This is an integrated layer of data and connecting processes that “utilizes continuous […]

The post Data Fabric: What It Is and How It Impacts Cybersecurity appeared first on Security Intelligence.

Continue reading Data Fabric: What It Is and How It Impacts Cybersecurity

Data Fabric: What It Is and How It Impacts Cybersecurity

Data use and generation today are both awesome and daunting to manage. What is the best way to manage this mountain of dispersed and disparate data? A possible answer lies in the concept of ‘data fabric’ as a means to unify data. This is an integrated layer of data and connecting processes that “utilizes continuous […]

The post Data Fabric: What It Is and How It Impacts Cybersecurity appeared first on Security Intelligence.

Continue reading Data Fabric: What It Is and How It Impacts Cybersecurity

The Great Resignation: How to Acquire and Retain Cybersecurity Talent

If you’ve been following reports and whispering with industry colleagues, you know what’s going on: the cybersecurity skills gap is difficult to close, and the Great Resignation is here. The 2021 (ISC)2 workforce study gives us a mixed picture of what to expect: The Cybersecurity Workforce Estimate states there are 4.19 million cybersecurity workers worldwide, […]

The post The Great Resignation: How to Acquire and Retain Cybersecurity Talent appeared first on Security Intelligence.

Continue reading The Great Resignation: How to Acquire and Retain Cybersecurity Talent

The Great Resignation: How to Acquire and Retain Cybersecurity Talent

If you’ve been following reports and whispering with industry colleagues, you know what’s going on: the cybersecurity skills gap is difficult to close, and the Great Resignation is here. The 2021 (ISC)2 workforce study gives us a mixed picture of what to expect: The Cybersecurity Workforce Estimate states there are 4.19 million cybersecurity workers worldwide, […]

The post The Great Resignation: How to Acquire and Retain Cybersecurity Talent appeared first on Security Intelligence.

Continue reading The Great Resignation: How to Acquire and Retain Cybersecurity Talent