Measure and Improve the Maturity of Your Incident Response Team

Incident response and management requires continual growth. Your team will not become proficient overnight.

The post Measure and Improve the Maturity of Your Incident Response Team appeared first on Security Intelligence.

Continue reading Measure and Improve the Maturity of Your Incident Response Team

A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Despite ever-growing investments in security tools, the risk of a data breach remains unacceptably high. This is the starting point of a strong a business case for investing in threat intelligence.

The post A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value appeared first on Security Intelligence.

Continue reading A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Does Your Security Awareness Program Put People First?

If people are the most important element of cybersecurity, why do many security awareness training programs fail to deliver the expected results?

The post Does Your Security Awareness Program Put People First? appeared first on Security Intelligence.

Continue reading Does Your Security Awareness Program Put People First?

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

A bigger cybersecurity budget is a tool to address security risks, business needs and industry changes. Here are 11 statistics on CISO spending to help inform your 2020 cybersecurity budget.

The post 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget appeared first on Security Intelligence.

Continue reading 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do

People’s understanding of what cybersecurity professionals do often bears little resemblance to the reality of what we actually do, but there are things you can and should do to correct this.

The post What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do appeared first on Security Intelligence.

Continue reading What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do

How Cybersecurity Salaries Fit Experience and Specialization

Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. Today, jobs are more specialized — with higher cybersecurity salaries to match.

The post How Cybersecurity Salaries Fit Experience and Specialization appeared first on Security Intelligence.

Continue reading How Cybersecurity Salaries Fit Experience and Specialization

Now’s the Time to Shift From Defense in Depth to Security in Depth

In today’s threat landscape, where many cybercriminals are sophisticated enough to circumvent layered safeguards, the old defense-in-depth approach is due for an upgrade.

The post Now’s the Time to Shift From Defense in Depth to Security in Depth appeared first on Security Intelligence.

Continue reading Now’s the Time to Shift From Defense in Depth to Security in Depth

How to Improve Your Board’s Oversight of Digital Transformation Efforts

A recent National Association of Corporate Directors and Marsh & McLennan Companies report offered recommendations that CISOs can use to help their organizations manage digital transformation.

The post How to Improve Your Board’s Oversight of Digital Transformation Efforts appeared first on Security Intelligence.

Continue reading How to Improve Your Board’s Oversight of Digital Transformation Efforts

Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo

Reading Time: 5 minutes One of the hardest — and most rewarding — lessons I learned during my first bid as a graduate security architect was to back my suggestions with confidence, but know when to back off.

The post Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo appeared first on Security Intelligence.

Continue reading Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program