Is Personality the Missing Piece of Security Awareness Training?

Reading Time: 3 minutes What if we have been approaching security awareness training all wrong? One way to start individualizing security education is by recognizing and working with personality types.

The post Is Personality the Missing Piece of Security Awareness Training? appeared first on Security Intelligence.

Continue reading Is Personality the Missing Piece of Security Awareness Training?

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there’s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Continue reading Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

Reading Time: 5 minutes The array of characters in the Star Trek world mimics the multifaceted role of today’s chief information security officer (CISO).

The post The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters appeared first on Security Intelligence.

Continue reading The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

Reading Time: 3 minutes The IT landscape is becoming more complex every day. To manage this complexity, companies need integrated, best-of-breed data protection solutions that secure both structured and unstructured data.

The post KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity appeared first on Security Intelligence.

Continue reading KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

What Is Security Intelligence? Here’s What Your Business Leaders Want to Know

Reading Time: 3 minutes How do you explain security intelligence to your COO? In today’s heightened threat landscape, where business leaders are reading about breaches in the news every day, it’s crucial to do your homework.

The post What Is Security Intelligence? Here’s What Your Business Leaders Want to Know appeared first on Security Intelligence.

Continue reading What Is Security Intelligence? Here’s What Your Business Leaders Want to Know

4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Reading Time: 4 minutes It’s not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact.

The post 4 Questions CISOs Need to Ask About Enterprise Cybersecurity appeared first on Security Intelligence.

Continue reading 4 Questions CISOs Need to Ask About Enterprise Cybersecurity

The Many Dimensions of Effective CISO Leaders

Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let’s explore four dimensions that CISOs must learn to master.

The post The Many Dimensions of Effective CISO Leaders appeared first on Security Intelligence.

Continue reading The Many Dimensions of Effective CISO Leaders

5 IoT Security Conferences You Don’t Want to Miss

If you’re a CISO, you should consider attending an IoT security conference to learn from the leaders in the field about how to integrate IoT security into your threat management program.

The post 5 IoT Security Conferences You Don’t Want to Miss appeared first on Security Intelligence.

Continue reading 5 IoT Security Conferences You Don’t Want to Miss

Why Security Incidents Often Go Underreported

If you saw a coworker browsing through a database they weren’t supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.

The post Why Security Incidents Often Go Underreported appeared first on Security Intelligence.

Continue reading Why Security Incidents Often Go Underreported

Third-Party Risks Need New Approaches

Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.

The post Third-Party Risks Need New Approaches appeared first on Security Intelligence.

Continue reading Third-Party Risks Need New Approaches