What is a Pentester, and Can They Prevent Data Breaches?

With the cost of data breaches at an all-time high, organizations are working to proactively identify areas of risk on the network. Using pentesters to conduct penetration (pen) testing is becoming more common. To protect themselves, businesses must know their risk areas before hackers find vulnerabilities. Organizations can lower their attack risk by protecting against […]

The post What is a Pentester, and Can They Prevent Data Breaches? appeared first on Security Intelligence.

Continue reading What is a Pentester, and Can They Prevent Data Breaches?

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants […]

The post Bridging the 3.4 Million Workforce Gap in Cybersecurity appeared first on Security Intelligence.

Continue reading Bridging the 3.4 Million Workforce Gap in Cybersecurity

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able […]

The post How Do Threat Hunters Keep Organizations Safe? appeared first on Security Intelligence.

Continue reading How Do Threat Hunters Keep Organizations Safe?

6 Roles That Can Easily Transition to a Cybersecurity Team

With the shortage of qualified tech professionals in the cybersecurity industry and increasing demand for trained experts, it can take time to find the right candidate with the necessary skill set. However, while searching for specific technical skill sets, many professionals in other industries may be an excellent fit for transitioning into a cybersecurity team. […]

The post 6 Roles That Can Easily Transition to a Cybersecurity Team appeared first on Security Intelligence.

Continue reading 6 Roles That Can Easily Transition to a Cybersecurity Team

Outrageous Stories From Three Cyber Incident Responders

Working in cyber incident response can certainly make life interesting. Experiences typically run the gamut from exciting, dull, fun, repetitive and challenging. IBM Security commissioned a study from Morning Consult that surveyed over 1,100 cybersecurity incident responders across ten countries. Unsurprisingly, over two-thirds of respondents experienced daily stress or anxiety due to the pressures of […]

The post Outrageous Stories From Three Cyber Incident Responders appeared first on Security Intelligence.

Continue reading Outrageous Stories From Three Cyber Incident Responders

What People Get Wrong About Incident Responders

Today’s threat landscape is ever-evolving and skyrocketing in complexity as bad actors possess more advanced tactics, techniques and procedures (TTP) than ever before. To address these advanced threats, deploying an incident response team is critical for modern organizations. An incident response (IR) team is responsible for analyzing security systems and responding to potentially harmful threats. […]

The post What People Get Wrong About Incident Responders appeared first on Security Intelligence.

Continue reading What People Get Wrong About Incident Responders

A Day in the Life: Working in Cyber Incident Response

As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s […]

The post A Day in the Life: Working in Cyber Incident Response appeared first on Security Intelligence.

Continue reading A Day in the Life: Working in Cyber Incident Response

Why Threat Analysis Will Continue to Play a Vital Role in Security

Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and false alarms across multiple systems come in amid a severe shortage of skilled workers. In this industry, performing detailed threat analysis with the data you already have will help protect your business. For that, you […]

The post Why Threat Analysis Will Continue to Play a Vital Role in Security appeared first on Security Intelligence.

Continue reading Why Threat Analysis Will Continue to Play a Vital Role in Security

5 Ways to Retain More Cybersecurity Professionals at Your Organization

Companies that have low retention rates are likely to increase their risk of a cybersecurity attack. The recent ISACA’s State of the Cybersecurity Workforce study found that 69% of respondents whose companies faced more attacks in the past year report being somewhat or very understaffed. However, retention is becoming a bigger challenge. The report also […]

The post 5 Ways to Retain More Cybersecurity Professionals at Your Organization appeared first on Security Intelligence.

Continue reading 5 Ways to Retain More Cybersecurity Professionals at Your Organization

To Retain Cybersecurity Employees, Know What Drives Them

COVID-19 may have given cybersecurity talent retention an artificial prop up over the last two years. For example, job satisfaction was on a downward trend from 2018 to 2019, but with the pandemic came a plateau in 2020 and 2021. Was the plateau due to newfound satisfaction or were there other factors, such as economic […]

The post To Retain Cybersecurity Employees, Know What Drives Them appeared first on Security Intelligence.

Continue reading To Retain Cybersecurity Employees, Know What Drives Them