User Experience: Achieving Performance and Security

Slow or inconsistent devices are the bane of a user’s existence. It’s understandable, as these types of experiences inhibit the user’s ability to be productive. But, a compromised user poses greater risks to the organization than a non-productiv… Continue reading User Experience: Achieving Performance and Security

3 Creative Strategies to Narrow the Skills Gap

The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it.

The post 3 Creative Strategies to Narrow the Skills Gap appeared first on Security Intelligence.

Continue reading 3 Creative Strategies to Narrow the Skills Gap

Higher Ed Brings Hands-On Cybersecurity Experiences to Students

The results of the 2018 (ISC)2 Cybersecurity Workforce Study showed a widening of the global cybersecurity workforce gap to nearly 3 million across North America, Latin America, Asia-Pacific (APAC) and Europe, the Middle East and Africa (EMEA). While … Continue reading Higher Ed Brings Hands-On Cybersecurity Experiences to Students

4 Sectors More Vulnerable Because of IoT

Wondering which sectors are most vulnerable because of the explosion of the internet of things (IoT)? The short answer is, “all of them,” but let’s take a look at four sectors that are growing increasingly more vulnerable to attack a… Continue reading 4 Sectors More Vulnerable Because of IoT

Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience.

The post Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience appeared first on Security Intelligence.

Continue reading Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

How to Create Better Security Awareness Content for Your Employees

Despite increased security awareness training efforts, human error is still responsible for the majority of data breaches today.

The post How to Create Better Security Awareness Content for Your Employees appeared first on Security Intelligence.

Continue reading How to Create Better Security Awareness Content for Your Employees

Is Employee Negligence Threatening Your Information Security?

With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.

The post Is Employee Negligence Threatening Your Information Security? appeared first on Security Intelligence.

Continue reading Is Employee Negligence Threatening Your Information Security?

People: The Critical Element in DevSecOps

In his talk, “DevOps is Automation, DevSecOps is People,” at the 2018 Security Congress in New Orleans, Mike Shema, CISO at Colbalt.io, said there needs to be a more collaborative approach when it comes to securing DevOps. The Classic DevOps Approach … Continue reading People: The Critical Element in DevSecOps

Forgo the FUD to Prevent the Security Breach

How fear, uncertainty and doubt feed the false belief that security breaches can’t be avoided Coming off the heels of the Facebook breach news, it might sound downright crazy to suggest that breaches can be avoided. But no organization is destin… Continue reading Forgo the FUD to Prevent the Security Breach

Does Your SOC Have a Security Playbook?

By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.

The post Does Your SOC Have a Security Playbook? appeared first on Security Intelligence.

Continue reading Does Your SOC Have a Security Playbook?