How to Talk to Leadership About a Zero Trust Model That’s Right For You

This is the second blog in a series about zero trust. Lack of requisite budget can be a major roadblock when it comes to adding a zero trust model. Why is this so much of a problem? And, how can a SOC team make the C-suite see how zero trust helps the business? In the […]

The post How to Talk to Leadership About a Zero Trust Model That’s Right For You appeared first on Security Intelligence.

Continue reading How to Talk to Leadership About a Zero Trust Model That’s Right For You

Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup

This month in digital security, scam text messages may seem like an easy attack to dodge, but they’re getting smarter. Meanwhile, chief information security officers are wearing lots of hats. And, is it really possible to ‘future proof’ anything? The World Economic Forum says the way we look at it now isn’t working. Here’s your […]

The post Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup appeared first on Security Intelligence.

Continue reading Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup

Women in Cybersecurity: Why Diversity Matters

March is Women’s History Month, so it’s a perfect time of the year to look back and see how far women in cybersecurity have come. From pioneering tech to achieving a gender-equal future in today’s world, it’s a story of invention, strength and achievement.  A Brief History of Women in Cybersecurity If you asked someone […]

The post Women in Cybersecurity: Why Diversity Matters appeared first on Security Intelligence.

Continue reading Women in Cybersecurity: Why Diversity Matters

How a CISO’s Executive Role Has Changed

Ever since the role of the chief information security officer (CISO) was first created in 1994, the position has been treated like the pesky youngest sibling in the C-suite family. In the office, the CISO wasn’t given the same voice as the chief information officer (CIO) or other executives. During meetings of the board of […]

The post How a CISO’s Executive Role Has Changed appeared first on Security Intelligence.

Continue reading How a CISO’s Executive Role Has Changed

Cloud Security Considerations to Watch Out for During Mergers and Acquisitions

Staying vigilant through each phase of a mergers and acquisitions (M&A) process can help businesses overcome cloud threats. Threat actors have hit victims during M&As in the past, such as the data breach that affected more than 500 million customers in 2018. Such cases force businesses to look into data exposure before and after M&As, […]

The post Cloud Security Considerations to Watch Out for During Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Cloud Security Considerations to Watch Out for During Mergers and Acquisitions

CISO Success: It’s About More Than Tech Skills

The chief information security officer (CISO) is a relatively new position in the C-suite. It’s about 25 years old or less, depending on whom you ask. But, it is only within the last 10 or so years that the role has taken on greater prominence, likely because of the increase in cyber breaches over the […]

The post CISO Success: It’s About More Than Tech Skills appeared first on Security Intelligence.

Continue reading CISO Success: It’s About More Than Tech Skills

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allocated to labor. Yet, barely more than […]

The post Cybersecurity Operations: 5 Ways to Cut Costs Without Pain appeared first on Security Intelligence.

Continue reading Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Security Modernization for the Cloud

This is the first in a blog series that will focus on all phases of security delivery: design, dev/build, test, deploy, operate and learn.  Many organizations are facing new cybersecurity concerns as they look to accelerate their digital transformations for themselves and their customers. At the same time, information technology (IT) and operations are being […]

The post Security Modernization for the Cloud appeared first on Security Intelligence.

Continue reading Security Modernization for the Cloud

4 Steps to Help You Plan a Cyber Resilience Roadmap

What is cyber resilience?  According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, contains and responds to a myriad of serious threats against data, applications and IT infrastructure.”  In a more colloquial sense, the “further along in the game” the organization is, the better positioned […]

The post 4 Steps to Help You Plan a Cyber Resilience Roadmap appeared first on Security Intelligence.

Continue reading 4 Steps to Help You Plan a Cyber Resilience Roadmap

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Biden, […]

The post #TwitterHack: Power, Privilege and Pandemic appeared first on Security Intelligence.

Continue reading #TwitterHack: Power, Privilege and Pandemic