Why Your Security Policies Could Be Failing Your Business

Over the past three decades in IT, a persistent problem lingers over even the most well-documented enterprise security policies: lackluster implementation.

The post Why Your Security Policies Could Be Failing Your Business appeared first on Security Intelligence.

Continue reading Why Your Security Policies Could Be Failing Your Business

Checkmate: How to Win the Cybersecurity Game

Some refer to information security as a war, but it’s better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.

The post Checkmate: How to Win the Cybersecurity Game appeared first on Security Intelligence.

Continue reading Checkmate: How to Win the Cybersecurity Game

Why the Entire C-Suite is Responsible in a Data Breach

C-suite executives and IT cyber pros not seeing eye to eye on cybersecurity is a common concern, but when crisis strikes this lack of alignment can have potentially catastrophic, business-ending consequences. In fact, IBM’s 2018 “Cost of a Data … Continue reading Why the Entire C-Suite is Responsible in a Data Breach

New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why

The 2018 NIST guidebook offers holistic, deeply integrated strategies for enterprise security, including establishing broad cultural standards for risk management.

The post New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why appeared first on Security Intelligence.

Continue reading New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why

How to Get Directors On Board With Cyber Risk Governance

The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments — not just IT — accountable for proper security hygiene.

The post How to Get Directors On Board With Cyber Risk Governance appeared first on Security Intelligence.

Continue reading How to Get Directors On Board With Cyber Risk Governance

Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.

The post Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong appeared first on Security Intelligence.

Continue reading Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

These Four Communication Tips Could Improve Your Cybersecurity Reporting

When it comes to cybersecurity reporting, CISOs must communicate security risks, priorities and initiatives in the language of business to earn the attention and respect of board directors.

The post These Four Communication Tips Could Improve Your Cybersecurity Reporting appeared first on Security Intelligence.

Continue reading These Four Communication Tips Could Improve Your Cybersecurity Reporting

Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty

Consumers demand a secure, world-class experience, but when organizations deploy new applications and services to deliver that experience, customer data is put at risk. If forward-thinking organizations are using security as a competitive differentiat… Continue reading Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty

April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy

April’s cybersecurity recap features more enterprises embracing AI and new insights into consumer perspectives on security.

The post April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy appeared first on Security Intelligence.

Continue reading April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy