Why You Need Attack Surface Management (And How To Achieve It)

Attack surface management (ASM) has rightly become a major priority for business leaders and digital defenders alike. The number of connected things is growing, and that means attackers have far more entryways into your networks and systems. With ASM, you can respond proactively to threats to stop them before they start. What is ASM?  So, […]

The post Why You Need Attack Surface Management (And How To Achieve It) appeared first on Security Intelligence.

Continue reading Why You Need Attack Surface Management (And How To Achieve It)

‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as just the latest un-addressed number in the inbox. In an inbox-zero case, the latest new alert is the most urgent task. But in a backed-up, […]

The post ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue appeared first on Security Intelligence.

Continue reading ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

Why Security Pros Can’t Ignore Big Data Monopolies

The rise of the cloud didn’t free us from concerns over who stores our data. Where matters, and major cloud providers and big data monopolies host a huge percentage of the world’s data. Thousands of organizations that store and manage personal, business and government data use big-name cloud providers. Smartphone platform companies house and process terabytes […]

The post Why Security Pros Can’t Ignore Big Data Monopolies appeared first on Security Intelligence.

Continue reading Why Security Pros Can’t Ignore Big Data Monopolies

Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care?

Disruption means constant change. This brings benefits to businesses and can improve customer loyalty. But, the costs tend to be new and large security challenges. Which raises the question: What role does the chief information security officer (CISO) hold in this ongoing transformation? In this series, we’ll look at perpetual disruption and its impact on cybersecurity […]

The post Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care? appeared first on Security Intelligence.

Continue reading Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care?

The Uncertainty of Cybersecurity Hiring

Cybersecurity hiring is going through a weird phase. The pandemic, the remote work movement, budget changes and the rising aggression and refinement of cyber attacks are all major shifts. Through it all, and into the future, is a persistent cybersecurity skills gap. There simply aren’t enough experts in this field to go around. And while […]

The post The Uncertainty of Cybersecurity Hiring appeared first on Security Intelligence.

Continue reading The Uncertainty of Cybersecurity Hiring

Firewall Services and More: What’s Next for IT?

Firewall services, cloud network protection tools and other IT defense staples are seeing a lot of changes in 2021. IT landscapes are growing more complex, as are the defense systems that protect them. Remote work is common, and more work is moving to the cloud. Companies of all sizes will be looking to streamline digital defense. What […]

The post Firewall Services and More: What’s Next for IT? appeared first on Security Intelligence.

Continue reading Firewall Services and More: What’s Next for IT?

Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

Cyberattacks can cause major loss of revenue for businesses and other groups of all sizes. As a result, cybersecurity insurance is being discussed more and more. The prospect of getting money back after an attack becomes increasingly appealing. But, is it right for every organization? What are the pros and cons? Who already has it? […]

The post Cybersecurity Insurance Pros and Cons: Is it the Best Policy? appeared first on Security Intelligence.

Continue reading Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

How to Shut Down Business Units Safely

A nimble organization needs to be ready for growth — and cuts. Sometimes business closure or shutting down a unit is needed, either as part of the evolution of a company, as part of a company’s growth via merger and acquisition, or as the result of restructuring or for some other reason, such as a […]

The post How to Shut Down Business Units Safely appeared first on Security Intelligence.

Continue reading How to Shut Down Business Units Safely

What You Need to Know About Scam Text Messages in 2021

The threat of scam text messages may now seem distant, even quaint. With all the new, exotic and sophisticated attacks that have arisen in the past decade, surely text message attacks are low on the list. But, they can still be a big problem.  Short message service (SMS) scams are social engineering attacks that work […]

The post What You Need to Know About Scam Text Messages in 2021 appeared first on Security Intelligence.

Continue reading What You Need to Know About Scam Text Messages in 2021

QR Code Security: What You Need to Know Today

QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and what can you do to boost QR code security and protect against these scams? What Are QR Codes Used For?  QR codes — short for “quick response codes” […]

The post QR Code Security: What You Need to Know Today appeared first on Security Intelligence.

Continue reading QR Code Security: What You Need to Know Today