Don’t Wait for Regulations to Transform Cryptocurrency Securities

As bitcoin theft increases and the crypto market remains volatile, the question emerging around cryptocurrency securities is whether government regulation will help stabilize the digital economy.

The post Don’t Wait for Regulations to Transform Cryptocurrency Securities appeared first on Security Intelligence.

Continue reading Don’t Wait for Regulations to Transform Cryptocurrency Securities

Demystifying Insider Threats

Insider threats are a growing concern for many organizations in large part because there is so much confusion around how they are defined. Security experts across all sectors interpret insider threats differently, thus assigning them different levels … Continue reading Demystifying Insider Threats

Cyber Kill Switch: The Good, the Bad and the Potentially Ugly

When WannaCry struck, companies across the globe feared they would be next until an unsuspecting hero emerged, sink-holing the worm with a kill switch. Since then, security defenders across all sectors have been trying to devise their own kill switch,… Continue reading Cyber Kill Switch: The Good, the Bad and the Potentially Ugly

IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program.

The post IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training appeared first on Security Intelligence.

Continue reading IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

5 Ways to Improve Collaboration Among Security Professionals

Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies.

The post 5 Ways to Improve Collaboration Among Security Professionals appeared first on Security Intelligence.

Continue reading 5 Ways to Improve Collaboration Among Security Professionals

How to Achieve Ransomware Recovery — Without Paying Ransom

Ransomware recovery can be costly for companies with no defense strategy in place. Here’s what your organization can do to protect itself from these ever-evolving threats.

The post How to Achieve Ransomware Recovery — Without Paying Ransom appeared first on Security Intelligence.

Continue reading How to Achieve Ransomware Recovery — Without Paying Ransom

Vehicle Cybersecurity: Mitigating the Threat of Connectedness

Earlier this year, authors David Morris, Garikayi Madzudzo and Alexeis Garcia-Perez released a report on threats to vehicle cybersecurity, noting that the systems in automobiles are as vulnerable as any other connected device. In large part, that is t… Continue reading Vehicle Cybersecurity: Mitigating the Threat of Connectedness

How to Navigate Business Ethics in a Data-Hungry Digital World

Data monetization and the digital transformation have forced organizations to navigate the new world of business ethics and security practices.

The post How to Navigate Business Ethics in a Data-Hungry Digital World appeared first on Security Intelligence.

Continue reading How to Navigate Business Ethics in a Data-Hungry Digital World

Cybersecurity Job Seekers: Go West (or South)

Job seekers looking to get into the cybersecurity field: Now is the time. Talented cybersecurity candidates are in such high demand that hiring managers are having trouble closing the deal when they present job offers. Unemployment is so low that if c… Continue reading Cybersecurity Job Seekers: Go West (or South)

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, convenience and cost optimization. Despite mass ado… Continue reading Mitigating Risks of Shadow IT with CASBs