Reach Out to Peers and Vendors to Build Your Security

Cyberattacks don’t happen in a vacuum. While your organization may be specifically targeted by cybercriminals, the style of attack they are using isn’t unique to you. It’s one they will use over and over, especially if it is successful, and will sell on the Dark Web for other cyber criminals to buy, use and modify. […]

The post Reach Out to Peers and Vendors to Build Your Security appeared first on Security Intelligence.

Continue reading Reach Out to Peers and Vendors to Build Your Security

How Cyber Insurance Changed Cybersecurity

When cyber insurance first became available in the 1990s, there wasn’t much need for it — or at least, so people thought. The internet as we know it today was still in its infancy, and most organizations didn’t see the point of cyber insurance. The original policies were to cover liability around software and media […]

The post How Cyber Insurance Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How Cyber Insurance Changed Cybersecurity

How the Talent Shortage Impacts Cybersecurity Leadership

The lack of a skilled cybersecurity workforce stalls the effectiveness of any organization’s security program. Yes, automated tools and technologies like artificial intelligence (AI) and machine learning (ML) offer a layer of support, and bringing in a managed security service provider (MSSP) provides expertise that isn’t available in-house. But it isn’t enough, especially for the […]

The post How the Talent Shortage Impacts Cybersecurity Leadership appeared first on Security Intelligence.

Continue reading How the Talent Shortage Impacts Cybersecurity Leadership

Secure-by-Design: A 2023 Cybersecurity Prime

The traditional approach to security has been to get the product to market fast and worry about security later. Unfortunately, that approach has never really worked. It puts too much of the cybersecurity responsibilities on the customer and leaves many vulnerabilities primed for exploitation at any point in the supply chain.  As cyber threats become […]

The post Secure-by-Design: A 2023 Cybersecurity Prime appeared first on Security Intelligence.

Continue reading Secure-by-Design: A 2023 Cybersecurity Prime

The Important Role of SOAR in Cybersecurity

Understaffed security teams need all the help they can get, and they are finding that help through SOAR. SOAR — security orchestration, automation and response — is defined by Gartner as the “technologies that enable organizations to collect inputs monitored by the security operations team.” Gartner identifies a SOAR platform’s three prime functionalities: Threat and […]

The post The Important Role of SOAR in Cybersecurity appeared first on Security Intelligence.

Continue reading The Important Role of SOAR in Cybersecurity

What Does a Network Security Engineer Do?

Cybersecurity is complex. The digital transformation, remote work and the ever-evolving threat landscape require different tools and different skill sets. Systems must be in place to protect endpoints, identities and a borderless network perimeter. The job role responsible for handling this complex security infrastructure is the network security engineer. In a nutshell, the network security […]

The post What Does a Network Security Engineer Do? appeared first on Security Intelligence.

Continue reading What Does a Network Security Engineer Do?

What’s Going Into NIST’s New Digital Identity Guidelines?

One of this year’s biggest positive cybersecurity events comes from the National Institute of Standards and Technology (NIST). For the first time since 2017, NIST is updating its digital identity guidelines.  These new guidelines will help set the course for best practices in handling digital identity for organizations across all sectors. What is Digital Identity? […]

The post What’s Going Into NIST’s New Digital Identity Guidelines? appeared first on Security Intelligence.

Continue reading What’s Going Into NIST’s New Digital Identity Guidelines?

Why Crowdsourced Security is Devastating to Threat Actors

Almost every day, my spouse and I have a conversation about spam. Not the canned meat, but the number of unwelcomed emails and text messages we receive. He gets several nefarious text messages a day, while I maybe get one a week. Phishing emails come in waves — right now, I’m getting daily warnings that […]

The post Why Crowdsourced Security is Devastating to Threat Actors appeared first on Security Intelligence.

Continue reading Why Crowdsourced Security is Devastating to Threat Actors

How The Talent Shortage Changes the Approach to Cybersecurity

There’s good news, and there’s bad news. The good news is that the number of cybersecurity professionals has reached an all-time high. According to (ISC)2’s annual Cybersecurity Workforce Study, 4.7 million people currently work in a security-related job.  The bad news: the study also found a worldwide gap of 3.4 million cybersecurity workers. 70% of […]

The post How The Talent Shortage Changes the Approach to Cybersecurity appeared first on Security Intelligence.

Continue reading How The Talent Shortage Changes the Approach to Cybersecurity

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their […]

The post Who Carries the Weight of a Cyberattack? appeared first on Security Intelligence.

Continue reading Who Carries the Weight of a Cyberattack?