Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

Threat intelligence to protect vulnerable communities

Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint […]

The post Threat intelligence to protect vulnerable communities appeared first on Security Intelligence.

Continue reading Threat intelligence to protect vulnerable communities

Updated SBOM guidance: A new era for software transparency?

The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains. In December 2023, the National Security Agency (NSA) published new guidance to help organizations […]

The post Updated SBOM guidance: A new era for software transparency? appeared first on Security Intelligence.

Continue reading Updated SBOM guidance: A new era for software transparency?

Operationalize cyber risk quantification for smart security

Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes […]

The post Operationalize cyber risk quantification for smart security appeared first on Security Intelligence.

Continue reading Operationalize cyber risk quantification for smart security

How I Got Started: White Hat Hacker

White hat hackers serve as a crucial line of cyber defense, working to identify and mitigate potential threats before malicious actors can exploit them. These ethical hackers harness their skills to assess the security of networks and systems, ultimately helping organizations bolster their digital defenses. But what drives someone to pursue a career as a […]

The post How I Got Started: White Hat Hacker appeared first on Security Intelligence.

Continue reading How I Got Started: White Hat Hacker

Is Your Cybersecurity “Too” Good?

Emphatically, no, it isn’t. But now that we have your attention, is that even the right question? Probably not. Your security can never truly be “too good”; conversely, neither can it be “too poor,” though it is possible to have “bad” security (more on that in a moment). If security is addressed in binary modes, […]

The post Is Your Cybersecurity “Too” Good? appeared first on Security Intelligence.

Continue reading Is Your Cybersecurity “Too” Good?

Continuous Threat Exposure Management Stops Modern Threats

The modern threat landscape presents serious challenges to businesses struggling to build their security programs.  While these businesses modernize IT and security programs, the attack surface is proliferating. Security leaders must realize that perimeter defenses no longer cope with the expanded attack surface, leaving gaps in security programs. Only by implementing a new systemic approach […]

The post Continuous Threat Exposure Management Stops Modern Threats appeared first on Security Intelligence.

Continue reading Continuous Threat Exposure Management Stops Modern Threats

Securing Your Supply Chain Through Cyber Risk Management

Supply chain risk is now recognized as a top challenge, with more than half of security breaches attributed to supply chain and third-party suppliers. This can be a costly vulnerability. The global average data breach cost was $4.35 million last year, according to IBM’s Cost of a Data Breach 2022 report. These risks stem from […]

The post Securing Your Supply Chain Through Cyber Risk Management appeared first on Security Intelligence.

Continue reading Securing Your Supply Chain Through Cyber Risk Management