HEAT and EASM: What to Know About the Top Acronyms at RSA

The cybersecurity industry is littered with acronyms. SIEM. EDR. APT. CISO. CISA. The list goes on and on. So it wasn’t surprising that there were a lot of acronyms in RSAC 2023’s sessions and keynotes, as well as in the dozens of news items and studies released during the conference. The hottest acronym, by far, […]

The post HEAT and EASM: What to Know About the Top Acronyms at RSA appeared first on Security Intelligence.

Continue reading HEAT and EASM: What to Know About the Top Acronyms at RSA

The Biden Administration’s 2023 Cybersecurity Strategy

The Biden Administration recently introduced a new national cybersecurity strategy, expected to aggressively address an increasingly complex and dangerous threat landscape. Improving cybersecurity may not be the top priority for the Biden Administration, but it is an issue that the White House has been focused on since the earliest days of President Biden’s tenure. For […]

The post The Biden Administration’s 2023 Cybersecurity Strategy appeared first on Security Intelligence.

Continue reading The Biden Administration’s 2023 Cybersecurity Strategy

ChatGPT Confirms Data Breach, Raising Security Concerns

When ChatGPT and similar chatbots first became widely available, the concern in the cybersecurity world was how AI technology could be used to launch cyberattacks. In fact, it didn’t take very long until threat actors figured out how to bypass the safety checks to use ChatGPT to write malicious code. It now seems that the […]

The post ChatGPT Confirms Data Breach, Raising Security Concerns appeared first on Security Intelligence.

Continue reading ChatGPT Confirms Data Breach, Raising Security Concerns

What Comes After the Digital Transformation?

When Covid hit, companies had to accelerate their digital transformation process out of necessity. But now, almost three years after the initial shutdown, most organizations have embraced digital to the point where they are now maintaining new technologies rather than implementing more.  Cybersecurity is a crucial component of a company’s digital transformation. But have organizations […]

The post What Comes After the Digital Transformation? appeared first on Security Intelligence.

Continue reading What Comes After the Digital Transformation?

Reach Out to Peers and Vendors to Build Your Security

Cyberattacks don’t happen in a vacuum. While your organization may be specifically targeted by cybercriminals, the style of attack they are using isn’t unique to you. It’s one they will use over and over, especially if it is successful, and will sell on the Dark Web for other cyber criminals to buy, use and modify. […]

The post Reach Out to Peers and Vendors to Build Your Security appeared first on Security Intelligence.

Continue reading Reach Out to Peers and Vendors to Build Your Security

How Cyber Insurance Changed Cybersecurity

When cyber insurance first became available in the 1990s, there wasn’t much need for it — or at least, so people thought. The internet as we know it today was still in its infancy, and most organizations didn’t see the point of cyber insurance. The original policies were to cover liability around software and media […]

The post How Cyber Insurance Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How Cyber Insurance Changed Cybersecurity

How the Talent Shortage Impacts Cybersecurity Leadership

The lack of a skilled cybersecurity workforce stalls the effectiveness of any organization’s security program. Yes, automated tools and technologies like artificial intelligence (AI) and machine learning (ML) offer a layer of support, and bringing in a managed security service provider (MSSP) provides expertise that isn’t available in-house. But it isn’t enough, especially for the […]

The post How the Talent Shortage Impacts Cybersecurity Leadership appeared first on Security Intelligence.

Continue reading How the Talent Shortage Impacts Cybersecurity Leadership

Secure-by-Design: A 2023 Cybersecurity Prime

The traditional approach to security has been to get the product to market fast and worry about security later. Unfortunately, that approach has never really worked. It puts too much of the cybersecurity responsibilities on the customer and leaves many vulnerabilities primed for exploitation at any point in the supply chain.  As cyber threats become […]

The post Secure-by-Design: A 2023 Cybersecurity Prime appeared first on Security Intelligence.

Continue reading Secure-by-Design: A 2023 Cybersecurity Prime

The Important Role of SOAR in Cybersecurity

Understaffed security teams need all the help they can get, and they are finding that help through SOAR. SOAR — security orchestration, automation and response — is defined by Gartner as the “technologies that enable organizations to collect inputs monitored by the security operations team.” Gartner identifies a SOAR platform’s three prime functionalities: Threat and […]

The post The Important Role of SOAR in Cybersecurity appeared first on Security Intelligence.

Continue reading The Important Role of SOAR in Cybersecurity

What Does a Network Security Engineer Do?

Cybersecurity is complex. The digital transformation, remote work and the ever-evolving threat landscape require different tools and different skill sets. Systems must be in place to protect endpoints, identities and a borderless network perimeter. The job role responsible for handling this complex security infrastructure is the network security engineer. In a nutshell, the network security […]

The post What Does a Network Security Engineer Do? appeared first on Security Intelligence.

Continue reading What Does a Network Security Engineer Do?