Mitigating Containers Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliver more power […]

The post Mitigating Containers Risk Requires a Comprehensive Approach appeared first on Security Intelligence.

Continue reading Mitigating Containers Risk Requires a Comprehensive Approach

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began […]

The post Visibility and Threat Detection in a Remote Working World appeared first on Security Intelligence.

Continue reading Visibility and Threat Detection in a Remote Working World

The Importance of People and Culture within the Security Operations Center

Security operations centers (SOCs) have changed dramatically over the last decade. Gartner predicts that by 2022, 50 percent of all SOCs will transform into modern centers with integrated incident response, threat intelligence and threat hunting capabilities, up from less than 10 percent in 2015. Organizations are investing heavily in tooling for detection and response as the number of […]

The post The Importance of People and Culture within the Security Operations Center appeared first on Security Intelligence.

Continue reading The Importance of People and Culture within the Security Operations Center

Three Key Pillars of Smart Identity

For years, identity and access management (IAM) was that painful necessity that businesses knew they had to spend time and resources on, but it was always done kind of grudgingly. Oh, how times have changed! CIOs and CISOs alike have recognized the critical role that identity plays in an overall digital transformation and security program centered […]

The post Three Key Pillars of Smart Identity appeared first on Security Intelligence.

Continue reading Three Key Pillars of Smart Identity

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift will be required to maintain cyber resilience.

The post Shift Your Cybersecurity Mindset to Maintain Cyber Resilience appeared first on Security Intelligence.

Continue reading Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations manage a variety of changes this year, cybersecurity leaders can serve as pillars of stability by keeping communication on track and on point.

The post How Cybersecurity Leaders Can Chart the Seas of Business Communication appeared first on Security Intelligence.

Continue reading How Cybersecurity Leaders Can Chart the Seas of Business Communication

It’s Time to Take a Fresh Look at Zero Trust

A convergence of trends and technologies is making Zero Trust an increasingly necessary cybersecurity strategy.

The post It’s Time to Take a Fresh Look at Zero Trust appeared first on Security Intelligence.

Continue reading It’s Time to Take a Fresh Look at Zero Trust

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

The United States Cyberspace Solarium Commission has made several recommendations for how the U.S. can strengthen its online infrastructure through government-enterprise cooperation.

The post What Enterprises Can Expect Following the Cyberspace Solarium Commission Report appeared first on Security Intelligence.

Continue reading What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

Stronger Together — Building Cyber Resilience

As new ways of work are coupled with a growing prevalence of malware and ransomware, cyber resilience has become top of mind in boardrooms around the world.

The post Stronger Together — Building Cyber Resilience appeared first on Security Intelligence.

Continue reading Stronger Together — Building Cyber Resilience

Measuring the Effectiveness of AI in the SOC

Technology professionals need to be able to prove the value that any new tool brings — especially a security-focused AI one — and demonstrate the revenue gained or losses prevented by their decisions.

The post Measuring the Effectiveness of AI in the SOC appeared first on Security Intelligence.

Continue reading Measuring the Effectiveness of AI in the SOC