Measuring the Value of Your Unified Endpoint Management (UEM) Investment

According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent.

The post Measuring the Value of Your Unified Endpoint Management (UEM) Investment appeared first on Security Intelligence.

Continue reading Measuring the Value of Your Unified Endpoint Management (UEM) Investment

Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats

As facial recognition technology advances, bad actors will have more biometric data with which to create deepfake images, videos, sounds and more. Is the security community prepared for this threat?

The post Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats appeared first on Security Intelligence.

Continue reading Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats

Long Live the Password — Even if You Don’t Want It To

To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.

The post Long Live the Password — Even if You Don’t Want It To appeared first on Security Intelligence.

Continue reading Long Live the Password — Even if You Don’t Want It To

In Such Transformative Times, the CISO Is Key to Delivering Digital Trust

Ensuring organizations adapt while also retaining a high level of digital trust is exactly where the chief information security officer (CISO) can help.

The post In Such Transformative Times, the CISO Is Key to Delivering Digital Trust appeared first on Security Intelligence.

Continue reading In Such Transformative Times, the CISO Is Key to Delivering Digital Trust

Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don’t require human oversight.

The post Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study appeared first on Security Intelligence.

Continue reading Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

What Is the Role of SIEM in the Fusion Center Era?

A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.

The post What Is the Role of SIEM in the Fusion Center Era? appeared first on Security Intelligence.

Continue reading What Is the Role of SIEM in the Fusion Center Era?

Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.

The post Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security appeared first on Security Intelligence.

Continue reading Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

The fourth annual “The Cyber Resilience Organization” study found that 23 percent of respondents are now using security automation, which includes both AI and machine learning, extensively.

The post Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart appeared first on Security Intelligence.

Continue reading Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

Rewrite the Rules to Reduce Complexity in Your Security Architecture

At RSAC 2019, Sridhar Muppidi and Devin Somppi implored vendors to “start looking at security as a team sport” and redouble their efforts to reduce complexity in their security architecture.

The post Rewrite the Rules to Reduce Complexity in Your Security Architecture appeared first on Security Intelligence.

Continue reading Rewrite the Rules to Reduce Complexity in Your Security Architecture

Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

Shared security culture is now critical for organizations to prevent IT burnout and respond to emerging threats. But what does this look like in practice?

The post Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture appeared first on Security Intelligence.

Continue reading Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture