Employee Education Is the Key to Enhanced Protection for Energy Companies

The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.

The post Employee Education Is the Key to Enhanced Protection for Energy Companies appeared first on Security Intelligence.

Continue reading Employee Education Is the Key to Enhanced Protection for Energy Companies

Connecting Fintech Security Perceptions to Reality

The state of fintech security will fluctuate based on the industry’s ability to maintain regulatory compliance and stay abreast of cybercrime trends.

The post Connecting Fintech Security Perceptions to Reality appeared first on Security Intelligence.

Continue reading Connecting Fintech Security Perceptions to Reality

Succession Planning: The Importance of a Deputy CISO

To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.

The post Succession Planning: The Importance of a Deputy CISO appeared first on Security Intelligence.

Continue reading Succession Planning: The Importance of a Deputy CISO

Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.

The post Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks appeared first on Security Intelligence.

Continue reading Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year

Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.

The post Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year appeared first on Security Intelligence.

Continue reading Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year

Avoiding Security Hype, the Hazard From Hollywood

Unfortunately, the Hollywood approach of security hype doesn’t do much to help organizations improve their actual security.

The post Avoiding Security Hype, the Hazard From Hollywood appeared first on Security Intelligence.

Continue reading Avoiding Security Hype, the Hazard From Hollywood

Four Key Considerations for Managing Your IoT Population

To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.

The post Four Key Considerations for Managing Your IoT Population appeared first on Security Intelligence.

Continue reading Four Key Considerations for Managing Your IoT Population

Security Awareness: How to Make Your Weakest Link Part of Your Defense

A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users.

The post Security Awareness: How to Make Your Weakest Link Part of Your Defense appeared first on Security Intelligence.

Continue reading Security Awareness: How to Make Your Weakest Link Part of Your Defense

Information Security in the Age of Disinformation

With so much disinformation being reported in the news and spread through social media, it’s hard for security professionals to know what to believe.

The post Information Security in the Age of Disinformation appeared first on Security Intelligence.

Continue reading Information Security in the Age of Disinformation

Four New Cyberthreats on the CISO’s Radar

An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.

The post Four New Cyberthreats on the CISO’s Radar appeared first on Security Intelligence.

Continue reading Four New Cyberthreats on the CISO’s Radar