Arming CISOs With the Skills to Combat Disinformation

As if chief information security officers (CISOs) did not have enough to deal with, add one more issue to their plates: information warfare. These operations now target private and non-governmental entities almost as often as they involve world powers. That’s why it’s more important than ever to know the difference between misinformation and disinformation — […]

The post Arming CISOs With the Skills to Combat Disinformation appeared first on Security Intelligence.

Continue reading Arming CISOs With the Skills to Combat Disinformation

Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the enterprise, armed with more resources, could sustain the shock. […]

The post Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource appeared first on Security Intelligence.

Continue reading Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

A Journey in Organizational Resilience: Survive the Disruption and Become Stronger

Our journey through the factors that make up organizational cyber resilience is almost complete. It’s time to put the puzzle pieces together.  First, a quick look at the issues we’ve covered so far.  The Human Factor Business Continuity Disaster Recovery Crisis Management Governance Testing and Training Privacy Security By Design Supply Chain and Third Parties […]

The post A Journey in Organizational Resilience: Survive the Disruption and Become Stronger appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Survive the Disruption and Become Stronger

It’s Not Too Soon to Start Talking About 6G

We may be only a short time into 5G deployments, but discussions of the impact 6G technology will have on our lives have already started. In late 2020, the Alliance for Telecommunications Industry Solutions created a new group called the Next G Alliance to “advance North American mobile technology leadership over the next decade through […]

The post It’s Not Too Soon to Start Talking About 6G appeared first on Security Intelligence.

Continue reading It’s Not Too Soon to Start Talking About 6G

A Journey in Organizational Resilience: Geopolitical and Socio-Economic Trends and Threats

The last stop on our organizational resilience journey touches one of the issues organizations have the least control over: geopolitical and socio-economic trends and threats. However, they can be some of the most impactful on your organization. Today, the ubiquitous use of interconnected information systems to carry commerce exists on a scale that never did […]

The post A Journey in Organizational Resilience: Geopolitical and Socio-Economic Trends and Threats appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Geopolitical and Socio-Economic Trends and Threats

Edge Computing and 5G: Will Security Concerns Outweigh Benefits?

You’re probably hearing a bunch of chatter about edge computing these days and how it, along with 5G, are the latest pieces of technology to redefine how we conduct our business. In fact, you may even be hearing people say that edge computing will replace cloud computing. Let’s separate the facts from the speculation.  What […]

The post Edge Computing and 5G: Will Security Concerns Outweigh Benefits? appeared first on Security Intelligence.

Continue reading Edge Computing and 5G: Will Security Concerns Outweigh Benefits?

A Journey in Organizational Resilience: Insider Threats

Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is why: because as we noted in the first piece of this series, you want to be able to bend while others break. An insider threat […]

The post A Journey in Organizational Resilience: Insider Threats appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Insider Threats

A Journey in Organizational Resilience: The Data Life Cycle

With so many efforts focused on restoring systems, applications and workloads, it is easy to miss an important piece: the data that makes business processes possible. A fully restored system is as good as offline if you don’t have the data required to work. Let’s face it: in the past, technology drove business capabilities. Today, […]

The post A Journey in Organizational Resilience: The Data Life Cycle appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: The Data Life Cycle

A Journey in Organizational Resilience: Supply Chain and Third Parties

The next stop on our journey focuses on those that you rely on: supply chains and third parties.  Working with external partners can be difficult. But, there is a silver lining. Recent attacks have resulted in an industry wake-up call when it comes to cybersecurity resilience. You see, the purpose of using external partners is […]

The post A Journey in Organizational Resilience: Supply Chain and Third Parties appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Supply Chain and Third Parties

A Journey in Organizational Resilience: Security by Design

Security by design is one of those concepts that happily goes hand in hand with resilience. Candidly, they were made for each other. The security by design methodology helps minimize some of the inherent risk we cannot do anything about. Building on a Tectonic Plate Consider for a moment you absolutely had to construct something […]

The post A Journey in Organizational Resilience: Security by Design appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Security by Design