Listen to Your Cassandras to Avoid Cybersecurity Disasters

Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage.

The post Listen to Your Cassandras to Avoid Cybersecurity Disasters appeared first on Security Intelligence.

Continue reading Listen to Your Cassandras to Avoid Cybersecurity Disasters

The Journey to Security and Cyber Resiliency

At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.

The post The Journey to Security and Cyber Resiliency appeared first on Security Intelligence.

Continue reading The Journey to Security and Cyber Resiliency

You Don’t Have to Sacrifice Security for Convenience to Establish Digital Trust

In an age of limited physical interaction, organizations need a way to establish digital trust without compromising the user experience.

The post You Don’t Have to Sacrifice Security for Convenience to Establish Digital Trust appeared first on Security Intelligence.

Continue reading You Don’t Have to Sacrifice Security for Convenience to Establish Digital Trust

Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology.

The post Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems appeared first on Security Intelligence.

Continue reading Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.

The post Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018 appeared first on Security Intelligence.

Continue reading Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

Now Trending: Your 2018 Network Security Snapshot

The top network security trends for security professionals to monitor in 2018 include the evolution of AI, cryptocurrency crime, serverless apps, digital twins, the IoT and more.

The post Now Trending: Your 2018 Network Security Snapshot appeared first on Security Intelligence.

Continue reading Now Trending: Your 2018 Network Security Snapshot

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.

The post New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 appeared first on Security Intelligence.

Continue reading New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

Does Your SIEM Need More Cowbell?

IBM QRadar offers all the bells and whistles — and cowbell — security teams need to enhance their SIEM capabilities without paying an arm and a leg.

The post Does Your SIEM Need More Cowbell? appeared first on Security Intelligence.

Continue reading Does Your SIEM Need More Cowbell?

Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now

The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.

The post Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now appeared first on Security Intelligence.

Continue reading Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now

The Cognitive Security Glide Path

Cognitive security solutions help security teams distinguish valuable threat data from noise on the network and respond to incidents more efficiently.

The post The Cognitive Security Glide Path appeared first on Security Intelligence.

Continue reading The Cognitive Security Glide Path