Now’s the Time to Shift From Defense in Depth to Security in Depth

In today’s threat landscape, where many cybercriminals are sophisticated enough to circumvent layered safeguards, the old defense-in-depth approach is due for an upgrade.

The post Now’s the Time to Shift From Defense in Depth to Security in Depth appeared first on Security Intelligence.

Continue reading Now’s the Time to Shift From Defense in Depth to Security in Depth

The Language of Business: Where the Board of Directors and Security Leaders Can Meet

IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization’s portfolio.

The post The Language of Business: Where the Board of Directors and Security Leaders Can Meet appeared first on Security Intelligence.

Continue reading The Language of Business: Where the Board of Directors and Security Leaders Can Meet

Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019

Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments.

The post Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 appeared first on Security Intelligence.

Continue reading Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019

Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go

At RSAC 2019, IBM Security General Manager Mary O’Brien noted that while the industry has made progress toward improving the experience of women in security, “a little better isn’t going to cut it.”

The post Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go appeared first on Security Intelligence.

Continue reading Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go

Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.

The post Your Security Strategy Is Only as Strong as Your Cyber Hygiene appeared first on Security Intelligence.

Continue reading Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI

With a corporate culture that supports transparency and human agency, it’s possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI.

The post Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI appeared first on Security Intelligence.

Continue reading Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI

5 Ways CISOs Can Improve Collaboration on Security Risks

While the CISO’s role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.

The post 5 Ways CISOs Can Improve Collaboration on Security Risks appeared first on Security Intelligence.

Continue reading 5 Ways CISOs Can Improve Collaboration on Security Risks

Why Security Skills Should Be Taught, Not Hired

To alleviate the cybersecurity hiring gap, CISOs should look to tap new pools of talent in adjacent industries and help new hires develop their security skills through thorough, regular training.

The post Why Security Skills Should Be Taught, Not Hired appeared first on Security Intelligence.

Continue reading Why Security Skills Should Be Taught, Not Hired

Why Isn’t Secure DevOps Being Practiced?

While chief information officers (CIOs) and leaders understand early testing is key to cost control and risk reduction, few teams are practicing secure DevOps in a way that meaningfully reduces risks.

The post Why Isn’t Secure DevOps Being Practiced? appeared first on Security Intelligence.

Continue reading Why Isn’t Secure DevOps Being Practiced?

Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.

The post Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer appeared first on Security Intelligence.

Continue reading Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer