Education Sector Ranks Last in Total Cybersecurity Safety

Upon returning from the NICE K12 Cybersecurity Education conference in San Antonio earlier this month, I was energized by the passion and impressed with the vast collection of educators who are eager to learn about infusing cybersecurity into their cl… Continue reading Education Sector Ranks Last in Total Cybersecurity Safety

From Naughty to NICE: Best Practices for K–12 Cybersecurity Education

The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training.

The post From Naughty to NICE: Best Practices for K–12 Cybersecurity Education appeared first on Security Intelligence.

Continue reading From Naughty to NICE: Best Practices for K–12 Cybersecurity Education

OSS Security a Top Priority in National Cyber Strategy

The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents. “The support … Continue reading OSS Security a Top Priority in National Cyber Strategy

Evaluating Risk Critical to Cloud Security

According to CloudAcademy’s “November 2018 Data Report,” the world is trending toward multi-cloud. In fact, multi-cloud environments have become such a reality that DevOps engineers are now expected to have concurrent proficiency in AWS an… Continue reading Evaluating Risk Critical to Cloud Security

5 Challenges Utilities Will Face in Preparing for New FERC Security Standards

Since the attack on the power grid in Ukraine, defending critical infrastructure against the threat of cyberattack has become a top priority. In an effort to strengthen supply chain risk management within the energy sector, the Federal Energy Regulato… Continue reading 5 Challenges Utilities Will Face in Preparing for New FERC Security Standards

How Can Government Security Teams Overcome Obstacles in IT Automation Deployment?

IT automation is the future of security programs, but it’s not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.

The post How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? appeared first on Security Intelligence.

Continue reading How Can Government Security Teams Overcome Obstacles in IT Automation Deployment?

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the old and in with the new, thus giving rise to the somewhat problematic enabl… Continue reading To BYOD or Not BYOD? Let Your Risk Decide

‘Tis the Season for Spreading Ad Malware

Ad malware ramps up with the surge in online shopping activity during the holiday season. Taking a few precautionary steps can help consumers and security teams protect their devices and networks.

The post ‘Tis the Season for Spreading Ad Malware appeared first on Security Intelligence.

Continue reading ‘Tis the Season for Spreading Ad Malware

E-Retailers: Stay Secure This (and Every) Holiday

‘Tis the season for labeling all things naughty and nice, especially when it comes to the retail sector. In anticipation of Black Friday and Cyber Monday, everyone wants to weigh in on how to avoid holiday shopping scams, but the reality is that no se… Continue reading E-Retailers: Stay Secure This (and Every) Holiday

How Can Industry Leaders and Academia Help Improve Cybersecurity Education?

It’s up to security and educational leaders alike to improve and expand opportunities for cybersecurity education.

The post How Can Industry Leaders and Academia Help Improve Cybersecurity Education? appeared first on Security Intelligence.

Continue reading How Can Industry Leaders and Academia Help Improve Cybersecurity Education?