Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training

With our mobile cybersecurity simulation facility, we can bring the Cyber Range experience to a global audience, helping companies develop the mastery and skills needed for cyberattack preparedness.

The post Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training appeared first on Security Intelligence.

Continue reading Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training

Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

It’s not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.

The post Cybersecurity Muscle Memory: Drilling for a Tight Incident Response appeared first on Security Intelligence.

Continue reading Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

The Digital Disaster: A CIO Embraces Cyber Resilience

What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.

The post The Digital Disaster: A CIO Embraces Cyber Resilience appeared first on Security Intelligence.

Continue reading The Digital Disaster: A CIO Embraces Cyber Resilience

What Is the Current State of Cyber Resilience?

Although new research revealed that the state of cyber resilience is improving — especially regarding executive engagement — there is still room for improvement.

The post What Is the Current State of Cyber Resilience? appeared first on Security Intelligence.

Continue reading What Is the Current State of Cyber Resilience?

Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance

The Center for Audit Quality (CAQ)’s “Cybersecurity Risk Management Oversight” guidance outlines key questions that board directors should ask about how the organization addresses risk.

The post Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance appeared first on Security Intelligence.

Continue reading Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance

March’s Top Cybersecurity News Stories: Responding to Attacks, Women in Security and a New Community for Security Pros

In this month’s cybersecurity news, major cities suffered crippling ransomware attacks, new research revealed a lack of incident response preparedness and IBM launched a community for security pros.

The post March’s Top Cybersecurity News Stories: Responding to Attacks, Women in Security and a New Community for Security Pros appeared first on Security Intelligence.

Continue reading March’s Top Cybersecurity News Stories: Responding to Attacks, Women in Security and a New Community for Security Pros

A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data

Welcome to the future. It’s January 2019 and cybercriminals are stealing your customer data. How will you use AI to execute your incident response plan and master the basics to avoid future incidents?

The post A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data appeared first on Security Intelligence.

Continue reading A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data

When It Comes to Cyber Risks, 2018 Is No Time to Play Games

Security teams had best bring their A-game to compete against ever-more sophisticated threat actors as new cyber risks emerge and evolve in 2018.

The post When It Comes to Cyber Risks, 2018 Is No Time to Play Games appeared first on Security Intelligence.

Continue reading When It Comes to Cyber Risks, 2018 Is No Time to Play Games

New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents

Most organizations around the world lack a consistent incident response plan and thus are unprepared to manage the repercussions of a cyberattack, according to a recent Ponemon report.

The post New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents appeared first on Security Intelligence.

Continue reading New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents