SecDevOps: Putting Security at the Heart of DevOps

A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.

The post SecDevOps: Putting Security at the Heart of DevOps appeared first on Security Intelligence.

Continue reading SecDevOps: Putting Security at the Heart of DevOps

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Social engineering schemes such as spear phishing rely on the human mind’s inclination toward self-deception to motivate users to open malicious links.

The post Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge appeared first on Security Intelligence.

Continue reading Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

The post Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption appeared first on Security Intelligence.

Continue reading Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

The Cloud Security Risks Hidden in Plain Sight

Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.

The post The Cloud Security Risks Hidden in Plain Sight appeared first on Security Intelligence.

Continue reading The Cloud Security Risks Hidden in Plain Sight

The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security

Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren’t mutually exclusive.

The post The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security appeared first on Security Intelligence.

Continue reading The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security

e-Signature Security Speeds Government Paperwork Along

The U.S. Census Bureau hopes to save $1.2 million annually by implementing e-signature technology in its internal personnel evaluation system.

The post e-Signature Security Speeds Government Paperwork Along appeared first on Security Intelligence.

Continue reading e-Signature Security Speeds Government Paperwork Along

Risk Governance: The True Secret Weapon of Cybersecurity

While security solutions can certainly help organizations fight ransomware and other threats, the best defense is a robust risk governance strategy.

The post Risk Governance: The True Secret Weapon of Cybersecurity appeared first on Security Intelligence.

Continue reading Risk Governance: The True Secret Weapon of Cybersecurity

Personal Electronic Devices Dodge TSA Ban — For Now

To the chagrin of enterprise security experts, the TSA recently decided against a proposed ban on packing personal electronic devices in carry-on luggage.

The post Personal Electronic Devices Dodge TSA Ban — For Now appeared first on Security Intelligence.

Continue reading Personal Electronic Devices Dodge TSA Ban — For Now