Supply Chain Security Amid Coronavirus Fallout

As the impacts of the global spread of COVID-19 continue to be felt by businesses everywhere, one area that is increasingly strained is the supply chain. If your business has not already seen disruption to its supply chain, chances are a need to adjus… Continue reading Supply Chain Security Amid Coronavirus Fallout

Resilient in Times of Disruption

Business disruptions include cyberattacks, natural disasters and outbreaks of illness and they can affect any organization ? sometimes globally, creating widespread impacts. These disruptive events spotlight critical risks we should all think about. R… Continue reading Resilient in Times of Disruption

What Leadership Qualities for CISOs Are Most Important in 2020?

Leadership qualities for CISOs continue to evolve in the direction of what’s being asked of top-level business executives.

The post What Leadership Qualities for CISOs Are Most Important in 2020? appeared first on Security Intelligence.

Continue reading What Leadership Qualities for CISOs Are Most Important in 2020?

How Do You Measure the Success of Your Patch Management Efforts?

With the recent shift in attack focus toward operating systems and the increase in publicized breaches and ransomware attacks, patch management is now essential for organizations.

The post How Do You Measure the Success of Your Patch Management Efforts? appeared first on Security Intelligence.

Continue reading How Do You Measure the Success of Your Patch Management Efforts?

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence is being built into security tools and services of all kinds, so it’s time to change our thinking around AI’s role in enterprise security.

The post Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security appeared first on Security Intelligence.

Continue reading Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity

Use cases play a key role in enabling organizations to focus on relevant cybersecurity defenses, but to deploy the proper use cases, businesses must understand their needs and goals.

The post What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity appeared first on Security Intelligence.

Continue reading What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity

How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities

By prioritizing security vulnerabilities based on weaponization and asset value, you can address them in manageable workloads and remediate the most critical ones first.

The post How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities appeared first on Security Intelligence.

Continue reading How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities

Your Security Strategy Should Scale and Evolve Alongside Your Business

As your business grows, you will need to deal with increased complexity around human interactions and technology and scale your defense strategy to account for sophisticated attacks from adversaries.

The post Your Security Strategy Should Scale and Evolve Alongside Your Business appeared first on Security Intelligence.

Continue reading Your Security Strategy Should Scale and Evolve Alongside Your Business

The Bedrock of Security

Many organizations struggle with insecure access methods and unidentified processes. Integrating new, updated resources and technology can be an increasingly valuable commodity for any organization. But without building the foundation first, it could e… Continue reading The Bedrock of Security

Lessons from the Louisiana Ransomware Attack

When a ransomware attack hit the state of Louisiana this week, affecting some of the state’s server computers, the government responded by taking its servers down. The move was a pre-emptive one, meant to prevent the ransomware from spreading to … Continue reading Lessons from the Louisiana Ransomware Attack