When you shouldn’t patch: Managing your risk factors

Look at any article with advice about best practices for cybersecurity, and about third or fourth on that list, you’ll find something about applying patches and updates quickly and regularly. Patching for known vulnerabilities is about as standard as it gets for good cybersecurity hygiene, right up there with using multi-factor authentication and thinking before […]

The post When you shouldn’t patch: Managing your risk factors appeared first on Security Intelligence.

Continue reading When you shouldn’t patch: Managing your risk factors

Will AI threaten the role of human creativity in cyber threat detection?

Cybersecurity requires creativity and thinking outside the box. It’s why more organizations are looking at people with soft skills and coming from outside the tech industry to address the cyber skills gap. As the threat landscape becomes more complex and nation-state actors launch innovative cyberattacks against critical infrastructure, there is a need for cybersecurity professionals […]

The post Will AI threaten the role of human creativity in cyber threat detection? appeared first on Security Intelligence.

Continue reading Will AI threaten the role of human creativity in cyber threat detection?

Cybersecurity awareness: Apple’s cloud-based AI security system

The rising influence of artificial intelligence (AI) has many organizations scrambling to address the new cybersecurity and data privacy concerns created by the technology, especially as AI is used in cloud systems. Apple addresses AI’s security and privacy issues head-on with its Private Cloud Compute (PCC) system. Apple seems to have solved the problem of […]

The post Cybersecurity awareness: Apple’s cloud-based AI security system appeared first on Security Intelligence.

Continue reading Cybersecurity awareness: Apple’s cloud-based AI security system

4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers

AI has made an impact everywhere else across the tech world, so it should surprise no one that the 2024 ISC2 Cybersecurity Workforce Study saw artificial intelligence (AI) jump into the top five list of security skills. It’s not just the need for workers with security-related AI skills. The Workforce Study also takes a deep […]

The post ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers appeared first on Security Intelligence.

Continue reading ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers

Why do software vendors have such deep access into customer systems?

To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making semiconductors and hardware. No one can go […]

The post Why do software vendors have such deep access into customer systems? appeared first on Security Intelligence.

Continue reading Why do software vendors have such deep access into customer systems?

Cybersecurity trends: IBM’s predictions for 2025

Cybersecurity concerns in 2024 can be summed up in two letters: AI (or five letters if you narrow it down to gen AI). Organizations are still in the early stages of understanding the risks and rewards of this technology. For all the good it can do to improve data protection, keep up with compliance regulations […]

The post Cybersecurity trends: IBM’s predictions for 2025 appeared first on Security Intelligence.

Continue reading Cybersecurity trends: IBM’s predictions for 2025

CISO vs. CEO: Making a case for cybersecurity investments

Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets. For example, at RSA Conference 2024, a roundtable discussion about […]

The post CISO vs. CEO: Making a case for cybersecurity investments appeared first on Security Intelligence.

Continue reading CISO vs. CEO: Making a case for cybersecurity investments

CISA’s cyber incident reporting portal: Progress and future plans

On August 29, 2024, CISA announced the launch of a new cyber-incident Reporting Portal, part of the new CISA Services Portal. “The Incident Reporting Portal enables entities and individuals reporting cyber incidents to create unique accounts, save reports and return to submit later, and eliminate the repetitive nature of inputting routine information such as contact […]

The post CISA’s cyber incident reporting portal: Progress and future plans appeared first on Security Intelligence.

Continue reading CISA’s cyber incident reporting portal: Progress and future plans