The Relationship: Why Technology Is Only One Part of the Equation

In the IT security industry, forging a relationship with the client is just as important to the long-term success of a security program as the tools used.

The post The Relationship: Why Technology Is Only One Part of the Equation appeared first on Security Intelligence.

Continue reading The Relationship: Why Technology Is Only One Part of the Equation

What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Stein’s Law says that if something cannot go on forever, it won’t. That even applies to your enterprise security program and its risk posture.

The post What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program appeared first on Security Intelligence.

Continue reading What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Reduce Risk With a Proactive Security Assessment

CISOs and security leaders who take a proactive security approach can dramatically reduce risk and better prepare organizations for a security incident.

The post Reduce Risk With a Proactive Security Assessment appeared first on Security Intelligence.

Continue reading Reduce Risk With a Proactive Security Assessment

Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs

The new 2016 “Securing the C-Suite” report from IBM revealed some insights and recommendations on the role of CFOs, CMOs and CHROs in cybersecurity.

The post Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs appeared first on Security Intelligence.

Continue reading Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs

F1 and Cybersecurity: How the CISO Secures a Place on the Podium

F1 drivers and CISOs both rely on fast, analyzed data to enable real-time decision-making and establish appropriate standards and controls.

The post F1 and Cybersecurity: How the CISO Secures a Place on the Podium appeared first on Security Intelligence.

Continue reading F1 and Cybersecurity: How the CISO Secures a Place on the Podium

Securing the C-Suite, Part 1: Lessons for Your CIO and CISO

A recent IBM study on cybersecurity perspectives in the C-suite offered some key insights and recommendations for a CIO or CISO.

The post Securing the C-Suite, Part 1: Lessons for Your CIO and CISO appeared first on Security Intelligence.

Continue reading Securing the C-Suite, Part 1: Lessons for Your CIO and CISO

More or Less: New Study Uncovers Diverging Security Strategies Among Today’s CISOs

CISOs may turn down one of two paths related to security practices. Is your organization doing more with more or going old-school?

The post More or Less: New Study Uncovers Diverging Security Strategies Among Today’s CISOs appeared first on Security Intelligence.

Continue reading More or Less: New Study Uncovers Diverging Security Strategies Among Today’s CISOs

Returning From Coventry: The Crisis of Consumability

The mandate to broaden security from check boxes of compliance goals to frameworks of risk management controls is causing a consumability crisis.

The post Returning From Coventry: The Crisis of Consumability appeared first on Security Intelligence.

Continue reading Returning From Coventry: The Crisis of Consumability

It’s Not Too Late to Correct Your Security Posture

An organization’s poor security posture can often lead to greater pains down the road if small, corrective actions are not implemented quickly.

The post It’s Not Too Late to Correct Your Security Posture appeared first on Security Intelligence.

Continue reading It’s Not Too Late to Correct Your Security Posture

Sent to Coventry: How Security Risks Are Changing Organizational Norms

Security risks and risk management are profoundly changing the philosophies, strategies, approaches and plans of the IT security function.

The post Sent to Coventry: How Security Risks Are Changing Organizational Norms appeared first on Security Intelligence.

Continue reading Sent to Coventry: How Security Risks Are Changing Organizational Norms