How Privileged Access Management Fits Into a Layered Security Strategy

In its early stages, privileged access management (PAM) involved protecting only the passwords used for privileged accounts. But it evolved beyond that single purpose in the years that followed. Nowadays, it includes other security functions like multifactor authentication (MFA), session monitoring, proxying and user behavior analytics (UBA). Take a look at how these connect for […]

The post How Privileged Access Management Fits Into a Layered Security Strategy appeared first on Security Intelligence.

Continue reading How Privileged Access Management Fits Into a Layered Security Strategy

How Privileged Access Management Fits Into a Layered Security Strategy

In its early stages, privileged access management (PAM) involved protecting only the passwords used for privileged accounts. But it evolved beyond that single purpose in the years that followed. Nowadays, it includes other security functions like multifactor authentication (MFA), session monitoring, proxying and user behavior analytics (UBA). Take a look at how these connect for […]

The post How Privileged Access Management Fits Into a Layered Security Strategy appeared first on Security Intelligence.

Continue reading How Privileged Access Management Fits Into a Layered Security Strategy

A Journey in Organizational Cyber Resilience Part 2: Business Continuity

Keeping a business up and running during a problem takes the right people for the job. When it comes to cyber resilience through tough times, many things come down to the human factor. We focused on that in the first piece in this series, but it also makes a big difference to the second topic: […]

The post A Journey in Organizational Cyber Resilience Part 2: Business Continuity appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 2: Business Continuity

A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Organizational resilience is key to good business. Sometimes confused with enterprise resilience, we use the former term instead because it applies to a business or agency of any size. Let’s take a look at how to improve employees’ cybersecurity posture by providing practical ideas they can add to their everyday habits. The result: cyber resilience […]

The post A Journey in Organizational Cyber Resilience Part 1: The Human Factor appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Thriving in Chaos: How Cyber Resilience Works

In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. Speakers at the RSA Conference 2021 talked about this in terms of maintaining cyber resilience in chaos. So, what does the buzzword ‘cyber resilience’ really mean? And why is it important to be able […]

The post Thriving in Chaos: How Cyber Resilience Works appeared first on Security Intelligence.

Continue reading Thriving in Chaos: How Cyber Resilience Works

Thriving in Chaos: How Cyber Resilience Works

In cybersecurity as in most jobs, problems don’t happen one at a time, you’re bound to have a few at once. Speakers at the RSA Conference 2021 talked about this in terms of maintaining cyber resilience in chaos. So, what does the buzzword ‘cyber resilience’ really mean? And why is it important to be able […]

The post Thriving in Chaos: How Cyber Resilience Works appeared first on Security Intelligence.

Continue reading Thriving in Chaos: How Cyber Resilience Works

Cybersecurity Framework: How To Create A Resilience Strategy

A cyber resilience framework, or cybersecurity framework, is a crucial component of modern-day business. In the face of rising threats from malware, phishing and high-tech threat actors, a cyber resilient company can position itself as a secure model for data protection customers can trust. Despite the growing security risks in a remote working world, many […]

The post Cybersecurity Framework: How To Create A Resilience Strategy appeared first on Security Intelligence.

Continue reading Cybersecurity Framework: How To Create A Resilience Strategy

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allocated to labor. Yet, barely more than […]

The post Cybersecurity Operations: 5 Ways to Cut Costs Without Pain appeared first on Security Intelligence.

Continue reading Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Keep Adversaries at Bay With the MITRE ATT&CK Framework

Organizations are adopting the MITRE ATT&CK framework to map their cybersecurity threat detection, prevention and response capabilities to attack scenarios.

The post Keep Adversaries at Bay With the MITRE ATT&CK Framework appeared first on Security Intelligence.

Continue reading Keep Adversaries at Bay With the MITRE ATT&CK Framework

The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens

While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems?

The post The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens appeared first on Security Intelligence.

Continue reading The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens