A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Organizational resilience is key to good business. Sometimes confused with enterprise resilience, we use the former term instead because it applies to a business or agency of any size. Let’s take a look at how to improve employees’ cybersecurity posture by providing practical ideas they can add to their everyday habits. The result: cyber resilience […]

The post A Journey in Organizational Cyber Resilience Part 1: The Human Factor appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Private 5G Security: Consider Security Risks Before Investing

So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]

The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.

Continue reading Private 5G Security: Consider Security Risks Before Investing

What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks

With cybersecurity guidelines coming down from the executive branch, industry and policymakers clearly both see the extent of the cyberattack problem. Take a look at the contents of the Biden administration’s May executive order and what it means for people working in the industry, especially in regards to supply chain attacks. The executive order covers […]

The post What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks appeared first on Security Intelligence.

Continue reading What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks

The OSI Model and You Part 7: Stopping Threats at the Application Layer

A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for system interconnection and networking. It has been very useful in that regard, but we have to be aware a lot has changed since its inception. […]

The post The OSI Model and You Part 7: Stopping Threats at the Application Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 7: Stopping Threats at the Application Layer

The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve come to the OSI presentation layer. Here translation, encryption and compression all happen. What Is the Presentation Layer? The simplest way to describe the OSI presentation […]

The post The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we are past just connecting devices. Now, we need to do something with that connection, which at this stage is called a session. This part of […]

The post The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer

As we’ve talked about in the rest of this series, there are several ways to use the Open Systems Interconnection (OSI) seven layers of networking model to help us secure our networks and make them more resilient. Now, we’ve reached the first of the ‘host’ layers, the OSI transport layer.  Previously, we described ‘what’ allows data […]

The post The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer

The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer

Networking models help us understand the ‘lay of the land’ when it comes to protecting the network. In our journey through the Open Systems Interconnection (OSI) framework, we’ve arrived at the last stop in the media group, the OSI network layer. Remember, we’ve gotten here via the OSI data link layer, or the ‘how’ the […]

The post The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer

The OSI Model and You Part 2: The Data Link Layer

If the physical layer we talked about earlier in this series about OSI layers is the ‘what’ that allows data to travel, the data link layer is the ‘how.’ In the previous piece of this seven-part series on the OSI model, we described the physical layer and what cybersecurity threats could impact it. Remember, the key […]

The post The OSI Model and You Part 2: The Data Link Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 2: The Data Link Layer

Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal

Even if you are not an engineer, NIST 800-160 Volume 1 could help you in your work to understand security by design. It shows what you need to secure your information system. In the other blogs in this series, we’ve summarized the major points of the document. In the final installment, we’ll take a look at […]

The post Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal