PR vs cybersecurity teams: Handling disagreements in a crisis

Check out our first two articles in this series, Cybersecurity crisis communication: What to do and Crisis communication: What NOT to do. When a cyber incident happens inside an organization, everyone in the company has a stake in how to approach remediation. The problem is that not everyone agrees on how to handle the public […]

The post PR vs cybersecurity teams: Handling disagreements in a crisis appeared first on Security Intelligence.

Continue reading PR vs cybersecurity teams: Handling disagreements in a crisis

Cybersecurity crisis communication: What to do

Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook […]

The post Cybersecurity crisis communication: What to do appeared first on Security Intelligence.

Continue reading Cybersecurity crisis communication: What to do

Digital solidarity vs. digital sovereignty: Which side are you on?

The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty. The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, […]

The post Digital solidarity vs. digital sovereignty: Which side are you on? appeared first on Security Intelligence.

Continue reading Digital solidarity vs. digital sovereignty: Which side are you on?

What cybersecurity pros can learn from first responders

Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the […]

The post What cybersecurity pros can learn from first responders appeared first on Security Intelligence.

Continue reading What cybersecurity pros can learn from first responders

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. […]

The post Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It appeared first on Security Intelligence.

Continue reading Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

The Role of Marketing and PR in Incident Response

Responding to a cyber incident requires teamwork across departments and disciplines. Technical incident responders must work to halt incoming attacks while the communications teams develop a public response. Clear communication is essential.  Communication strategies differ before and after a cyber incident. The way a company approaches both is as important as incident mitigation itself. How […]

The post The Role of Marketing and PR in Incident Response appeared first on Security Intelligence.

Continue reading The Role of Marketing and PR in Incident Response

What is an Incident Response Professional?

As part of our ongoing series highlighting various roles in the cybersecurity industry, this article shines the light on the incident response professional. While there are many misconceptions surrounding the role, let’s examine a few frequently asked questions. How In-Demand is this Particular Role? Why?  Year after year, the story is the same: Cybersecurity jobs […]

The post What is an Incident Response Professional? appeared first on Security Intelligence.

Continue reading What is an Incident Response Professional?

Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

By Tej Tulachan The Cofense Phishing Defense CenterTM (PDC) has prevented a phishing attack that attempts to steal users’ Office365 credentials by luring them with a fake payment order attachment. Hiding a malicious re-direct within a html file, threat… Continue reading Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway