Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit

The universe is getting smaller, and space cybersecurity is keeping up. On May 30, 2020, nearly a decade after the Space Shuttle program ended, people witnessed a first: a vehicle built as part of a public-private partnership (between SpaceX and NASA) took off into space. This development was transformational because it brought the world one […]

The post Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit appeared first on Security Intelligence.

Continue reading Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit

Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget

As businesses across all industries evolve, once discretionary expenses become operating costs.  Insurance coverage, for example, is pretty much ‘a must’ across many industries. The latest may be cybersecurity costs, because protecting your most important currency, information, requires ongoing attention. When looking at your cybersecurity budget, factor in every part of the recipe. What are […]

The post Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget appeared first on Security Intelligence.

Continue reading Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget

Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management

There is one risk cybersecurity experts often overlook: burnout. We can build on threat detection and incident response capabilities and use cybersecurity risk management frameworks, such as NIST CSF, to improve our overall risk posture all we want without ever looking inward. Because burnout is internal, we may not always see it. But left unmanaged, it can […]

The post Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management appeared first on Security Intelligence.

Continue reading Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management

Data Destruction: Importance and Best Practices

As discussed in an earlier piece, data should be treated as a valuable currency. But there is another aspect to data handling that needs to be considered: data as a liability. Having your data fall into the wrong hands can be incredibly damaging to you and your team, which is all the more reason to […]

The post Data Destruction: Importance and Best Practices appeared first on Security Intelligence.

Continue reading Data Destruction: Importance and Best Practices

Cybersecurity Today: The Intersection of Technology and Behavior

In the movie “Back to the Future II,” protagonist Marty McFly travels forward to the year 2015. During a quick stop at Café 80s, Marty encounters two children, confused by the 80s-style arcade game in the store. When Marty shows them how to play, the kids retort with, “You mean you have to use your hands?” […]

The post Cybersecurity Today: The Intersection of Technology and Behavior appeared first on Security Intelligence.

Continue reading Cybersecurity Today: The Intersection of Technology and Behavior

Cybersecurity Risk Management: Protecting Our Most Valuable Currency

Cybersecurity risk management can be a unifying conversation throughout your organization. Few things are more challenging in the cybersecurity business than getting stakeholders to speak in the same language. The business planners are talking supply and demand; the IT department is talking bits and bytes; the HR department is talking wellness and productivity; the C-suite […]

The post Cybersecurity Risk Management: Protecting Our Most Valuable Currency appeared first on Security Intelligence.

Continue reading Cybersecurity Risk Management: Protecting Our Most Valuable Currency

Back to Basics: Creating a Culture of Cybersecurity at Work

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people […]

The post Back to Basics: Creating a Culture of Cybersecurity at Work appeared first on Security Intelligence.

Continue reading Back to Basics: Creating a Culture of Cybersecurity at Work

When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

Knowing who your users are today is more important than ever. This explains, in part, why integrating biometric usage into identity and access management (IAM) appears appealing. Throw in some artificial intelligence (AI) to help manage all these data points, and the future of biometrics looks pretty wild. The appeal of using biometrics for identity […]

The post When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics appeared first on Security Intelligence.

Continue reading When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

4 Steps to Help You Plan a Cyber Resilience Roadmap

What is cyber resilience?  According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, contains and responds to a myriad of serious threats against data, applications and IT infrastructure.”  In a more colloquial sense, the “further along in the game” the organization is, the better positioned […]

The post 4 Steps to Help You Plan a Cyber Resilience Roadmap appeared first on Security Intelligence.

Continue reading 4 Steps to Help You Plan a Cyber Resilience Roadmap

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security should be at […]

The post The Latest Mobile Security Threats and How to Prevent Them appeared first on Security Intelligence.

Continue reading The Latest Mobile Security Threats and How to Prevent Them