Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap?

Is an inability to define security the main cause of the cybersecurity skills gap? If we can’t truly define what security is, how can organizations design the right cybersecurity jobs for their needs?

The post Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap? appeared first on Security Intelligence.

Continue reading Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap?

Survey: SMBs Plan to Embrace AI but Don’t Know the Risks

Is 2020 the year that AI technology takes hold in SMBs? According to a study from Zix-AppRiver, the answer is yes. Nearly 9 out of 10 SMBs report they have a high interest in adopting AI this year; for businesses with more than 150 employees, the inte… Continue reading Survey: SMBs Plan to Embrace AI but Don’t Know the Risks

Security Pros Offer Best Bangs for 2020 Budget

How best to utilize your 2020 security budget? Here are a few recommendations from those in the know The new year is a chance for a fresh start, and for many organizations, that fresh start comes with a new budget and spending agendas. According to re… Continue reading Security Pros Offer Best Bangs for 2020 Budget

Cloud Misconfigurations: The Security Problem Coming From Inside IT

Cloud misconfigurations are becoming a major security risk among organizations using public clouds The need for smart cybersecurity never gets a holiday. That was made clear in December, a time when many organizations slow down production or close sho… Continue reading Cloud Misconfigurations: The Security Problem Coming From Inside IT

Looking Back on a Year of (Unexpected) Security Keynote Speeches

As wide-ranging as the security keynote speeches I heard last year were, almost all had a similar message: We’re overwhelmed by threats that, if left unanswered, could take down our institutions.

The post Looking Back on a Year of (Unexpected) Security Keynote Speeches appeared first on Security Intelligence.

Continue reading Looking Back on a Year of (Unexpected) Security Keynote Speeches

Deepfakes Pose New Security Challenges

Expect to hear a lot about deepfakes in 2020. It’s not that manipulating images is anything new, but with technology advantages and the increasing use of biometrics as an authentication tool, deepfakes will impact cybersecurity efforts. For example, c… Continue reading Deepfakes Pose New Security Challenges

Best of 2019: Companies Ignoring Third-Party Breach Alerts

As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the first in our weeklong series of the Best of 2019. What would you do if you found out through a third party that your organi… Continue reading Best of 2019: Companies Ignoring Third-Party Breach Alerts

Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online

Some tech gifts for kids come with a big price, and it isn’t the one on your credit card bill. Be sure to consider security and the best practices for keeping kids safe online as you shop this year.

The post Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online appeared first on Security Intelligence.

Continue reading Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online

Lack of Mobile Strategy Creates Security Holes

How a security-focused mobile strategy can help organizations stay safe in their digital transformation efforts and beyond The focus of many organizations’ digital transformation has been on mobile devices. Employees depend on their smartphones … Continue reading Lack of Mobile Strategy Creates Security Holes

Best of 2019: End-of-Life Devices Pose Data Breach Risk

As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the third in our weeklong series of the Best of 2019. End-of-life devices not properly sanitized of data can cause compliance i… Continue reading Best of 2019: End-of-Life Devices Pose Data Breach Risk