Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. […]

The post Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It appeared first on Security Intelligence.

Continue reading Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

How to Embed Gen Z in Your Organization’s Security Culture

Generation Z, which Pew Research Center defines as those born after 1996, is considered the first digital-native generation. This group of young people always has the latest technology at their fingertips. Yet even with this strong digital connection, the National Cybersecurity Alliance (NCSA) found that Gen Zers have higher cyber incident victimization rates than previous […]

The post How to Embed Gen Z in Your Organization’s Security Culture appeared first on Security Intelligence.

Continue reading How to Embed Gen Z in Your Organization’s Security Culture

Putting Your SOC in the Hot Seat

Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to watch for alerts of attacks and appropriately address those alerts before they become all-out crises. Yet with ransomware attacks maintaining first place as the top […]

The post Putting Your SOC in the Hot Seat appeared first on Security Intelligence.

Continue reading Putting Your SOC in the Hot Seat

Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Humanity has been through a number of industrial revolutions since the 1760s, and is now at its fourth cycle of sweeping industrial innovation, known as Industry 4.0. It is characterized by the ongoing automation of traditional manufacturing and industrial practices using modern smart technology. As such, it inherits risks and threats that apply to connected […]

The post Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0 appeared first on Security Intelligence.

Continue reading Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Chaos Engineering: Building the Next Generation of Cyber Ranges

In one of our past posts on the same subject, we discussed how to apply chaos engineering principles to cyber war-games and team simulation exercises in broad brush strokes. In short, ‘chaos engineering’ is the discipline of working and experimenting with new features and changes on a system that’s already in live production. The purpose […]

The post Chaos Engineering: Building the Next Generation of Cyber Ranges appeared first on Security Intelligence.

Continue reading Chaos Engineering: Building the Next Generation of Cyber Ranges

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election

Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks

In addition to targeted attacks, organizations in the financial services industry also face the threat of systemic financial cyberattacks. But are companies prepared for this type of threat?

The post Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks appeared first on Security Intelligence.

Continue reading Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks

Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training

With our mobile cybersecurity simulation facility, we can bring the Cyber Range experience to a global audience, helping companies develop the mastery and skills needed for cyberattack preparedness.

The post Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training appeared first on Security Intelligence.

Continue reading Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training

Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

Practice: The Best Defense for Responding to Cyber Incidents

When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.

The post Practice: The Best Defense for Responding to Cyber Incidents appeared first on Security Intelligence.

Continue reading Practice: The Best Defense for Responding to Cyber Incidents