Understanding the Zeros Beyond Zero Trust

Zero trust is a popular cybersecurity model, so much so that speakers at OpenText’s Enfuse 2019 conference said we are now living in a zero trust world. However, while zero trust is the umbrella, there are a lot of other zeros out there that must be m… Continue reading Understanding the Zeros Beyond Zero Trust

Create Cyber Incident Response Policies for Any Type of Disaster

If your organization is proactive, you should have a cyber incident policy in place for that worst-case scenario of your files being compromised by a bad actor.

The post Create Cyber Incident Response Policies for Any Type of Disaster appeared first on Security Intelligence.

Continue reading Create Cyber Incident Response Policies for Any Type of Disaster

Reasons Behind the Cybersecurity Skills Gap

There have been a lot of studies this year examining the cybersecurity workforce and skills shortage, but the (ISC)2 Cybersecurity Workforce Study 2019 has taken a different approach to analyzing the state of the cybersecurity shortage. (ISC)2 has bee… Continue reading Reasons Behind the Cybersecurity Skills Gap

Report Underscores Growing Awareness of Application Security

A recent report shows a greater number of companies are viewing their application development efforts with an eye toward security, as vulnerabilities introduced by poor code hygiene and other factors continue to rise. Organizations are more aware than… Continue reading Report Underscores Growing Awareness of Application Security

How to Start Building an Insider Threat Program

Sometimes it only takes one moment, one life-changing incident, to turn the most trustworthy employee into an insider threat.

The post How to Start Building an Insider Threat Program appeared first on Security Intelligence.

Continue reading How to Start Building an Insider Threat Program

What Fortnite Teaches Us About Security Awareness

What does Fortnite do to get kids so addicted to it? Why are kids eager to spend money on Easter eggs and tokens that have nothing at all to do with quests but are just fun? And why do millions of young people watch other people play Fortnite on Twitc… Continue reading What Fortnite Teaches Us About Security Awareness

Securing the SMB With a Small Budget

Securing the SMB can be a daunting task. You need a healthy budget to cover the costs of a good security system, you need to hire a security pro (and what does a security pro do, anyway?) and, well, you don’t know how you are going to make any of this… Continue reading Securing the SMB With a Small Budget

SMBs Want Better Security. MSPs Struggle to Provide It

A look at the role MSPs play in securing SMBs and where they could use help themselves, as they deal with many of the same security issues In May, I wrote a post that focused on the SMB struggle to recognize and deploy good security, according to a su… Continue reading SMBs Want Better Security. MSPs Struggle to Provide It

SMBs Want Better Security. MSPs Struggle to Provide It

A look at the role MSPs play in securing SMBs and where they could use help themselves, as they deal with many of the same security issues In May, I wrote a post that focused on the SMB struggle to recognize and deploy good security, according to a su… Continue reading SMBs Want Better Security. MSPs Struggle to Provide It

To Determine Insider Threat Risk, Chart It Out

Insider threats are a big problem, but you probably know that. And, consequently, the more people you have with access to your network and data, the bigger your attack vector becomes. While the negligent insider is the cause of most cyber incidents—ac… Continue reading To Determine Insider Threat Risk, Chart It Out