Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

It’s time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.

The post Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets appeared first on Security Intelligence.

Continue reading Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

How to Choose the Right Artificial Intelligence Solution for Your Security Problems

If you’re thinking about adopting artificial intelligence as an ally in your security operations center, the following questions and considerations can be helpful to guide your decision-making.

The post How to Choose the Right Artificial Intelligence Solution for Your Security Problems appeared first on Security Intelligence.

Continue reading How to Choose the Right Artificial Intelligence Solution for Your Security Problems

Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

User behavior analytics (UBA) is a good application, but it isn’t a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.

The post Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform appeared first on Security Intelligence.

Continue reading Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

Busting Cybersecurity Silos

To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape.

The post Busting Cybersecurity Silos appeared first on Security Intelligence.

Continue reading Busting Cybersecurity Silos

Top 5 Reasons to Attend the IBM Security Sessions at Think 2019

As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.

The post Top 5 Reasons to Attend the IBM Security Sessions at Think 2019 appeared first on Security Intelligence.

Continue reading Top 5 Reasons to Attend the IBM Security Sessions at Think 2019

How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

Dimitry Snezhkov didn’t touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.

The post How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing appeared first on Security Intelligence.

Continue reading How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI

With a corporate culture that supports transparency and human agency, it’s possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI.

The post Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI appeared first on Security Intelligence.

Continue reading Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI

Is Malware Analysis Right for Your Business?

For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.

The post Is Malware Analysis Right for Your Business? appeared first on Security Intelligence.

Continue reading Is Malware Analysis Right for Your Business?

Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

These days, many electronics companies deploy industrial IoT technologies without evaluating or protecting against cybersecurity risks, or preparing a fast and effective response to a breach.

The post Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments appeared first on Security Intelligence.

Continue reading Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

Orchestrating Incident Response Beyond Triage and Enrichment

Incident response orchestration can help security teams transform response across the entire incident life cycle, including automating remedial actions and mitigating future attacks.

The post Orchestrating Incident Response Beyond Triage and Enrichment appeared first on Security Intelligence.

Continue reading Orchestrating Incident Response Beyond Triage and Enrichment