Checkmate: How to Win the Cybersecurity Game

Some refer to information security as a war, but it’s better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.

The post Checkmate: How to Win the Cybersecurity Game appeared first on Security Intelligence.

Continue reading Checkmate: How to Win the Cybersecurity Game

Less Is More: Why CISOs Should Consolidate Their Security Tools

CISOs need a broad range of security tools to fulfill their growing list of responsibilities. The more they can consolidate these solutions, the easier they are to manage and monitor.

The post Less Is More: Why CISOs Should Consolidate Their Security Tools appeared first on Security Intelligence.

Continue reading Less Is More: Why CISOs Should Consolidate Their Security Tools

Bring These Security Metrics to Your Next Budget Meeting With the Board

By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity.

The post Bring These Security Metrics to Your Next Budget Meeting With the Board appeared first on Security Intelligence.

Continue reading Bring These Security Metrics to Your Next Budget Meeting With the Board

How to Manage App Security Amid Expanding Shadow IT

Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.

The post How to Manage App Security Amid Expanding Shadow IT appeared first on Security Intelligence.

Continue reading How to Manage App Security Amid Expanding Shadow IT

The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.

The post The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More appeared first on Security Intelligence.

Continue reading The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why

The 2018 NIST guidebook offers holistic, deeply integrated strategies for enterprise security, including establishing broad cultural standards for risk management.

The post New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why appeared first on Security Intelligence.

Continue reading New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why

Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don’t know how to get the most out of their security information and event management (SIEM) solution.

The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation appeared first on Security Intelligence.

Continue reading Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.

The post Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT appeared first on Security Intelligence.

Continue reading Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

How to Get Directors On Board With Cyber Risk Governance

The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments — not just IT — accountable for proper security hygiene.

The post How to Get Directors On Board With Cyber Risk Governance appeared first on Security Intelligence.

Continue reading How to Get Directors On Board With Cyber Risk Governance

Generation Gap: Does Your Security Awareness Program Bridge the Divide?

As more millennials enter the workforce, organizations should consider different approaches to security awareness training to account for generational knowledge gaps.

The post Generation Gap: Does Your Security Awareness Program Bridge the Divide? appeared first on Security Intelligence.

Continue reading Generation Gap: Does Your Security Awareness Program Bridge the Divide?