Do We Really Have a Cybersecurity Skills Gap: Time to Refocus the Hiring Process

Is there a cybersecurity skills gap? Plenty of surveys and anecdotal evidence seem to say that’s the case. For example, an end-of-year survey of IT professionals conducted by ESG found that 53 percent of organizations reported a shortage of security s… Continue reading Do We Really Have a Cybersecurity Skills Gap: Time to Refocus the Hiring Process

Government Shutdown’s Negative Impact on Federal Cybersecurity

A quick glance at the headlines tell you how the government shutdown is affecting people across the country. National parks vandalized. Food safety inspections halted. Air travel at risk as planes aren’t fixed or inspected and TSA workers calling in s… Continue reading Government Shutdown’s Negative Impact on Federal Cybersecurity

Moving to a Cloud Service? Don’t Ditch Your Security Pros

Cloud services aren’t security by default. Here’s what you need to know. Over the holidays, a relative showed me the multiple steps required to log into his work account. Just as I was commenting about the security measures involved with t… Continue reading Moving to a Cloud Service? Don’t Ditch Your Security Pros

Best Practice Response Can Mitigate Data Breaches Quickly

It takes about six months for a company to detect that a data breach occurred in its system. During that time, hackers can do a lot of damage. So obviously you want to be able to mitigate the incident as quickly as possible. To do this, you should con… Continue reading Best Practice Response Can Mitigate Data Breaches Quickly

Public Clouds: Fertile Ground to Spread Malware

Public cloud security has always been a challenge, and there is no indication that it will get easier. According to a McAfee study, for instance, cloud adoption increased 15 percent over the past year. At the same time, sharing of sensitive data over … Continue reading Public Clouds: Fertile Ground to Spread Malware

Chief Enterprise Intelligence Officer: Necessary Addition to the C-Suite?

CEIOs can provide a level of intelligence to cybersecurity that currently isn’t there Historically, C-level executives haven’t been involved in their organization’s cybersecurity efforts. Even now, with the number of high-profile data breaches, … Continue reading Chief Enterprise Intelligence Officer: Necessary Addition to the C-Suite?

Dark Patterns: Stealth Ways Companies Collect Personal Data

Security experts and security writers talk a lot about how sophisticated cybercriminals are at getting the information they want. But what we don’t talk enough about is how well legitimate companies are at tricking consumers into revealing our persona… Continue reading Dark Patterns: Stealth Ways Companies Collect Personal Data

Data Privacy Must Evolve Beyond Confidentiality

Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.

The post Data Privacy Must Evolve Beyond Confidentiality appeared first on Security Intelligence.

Continue reading Data Privacy Must Evolve Beyond Confidentiality

How AI and Machine Learning Can Fool Biometric Sensors

Both my phone and my tablet have fingerprint sensors. For some reason, my tablet never reads my fingerprint correctly, so I find I have to try multiple times before giving up and using another method of authentication to log on. But my phone’s sensor … Continue reading How AI and Machine Learning Can Fool Biometric Sensors

Canada’s New Data Privacy Law Now in Effect

The other day I got a 2019 prediction from TrustArc CEO Chris Babel. He said that managing privacy will be the new normal, like securing data or paying taxes. “Privacy will continue on a similar path as the evolution of cybersecurity. Like with securi… Continue reading Canada’s New Data Privacy Law Now in Effect