Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Commentary: Australia’s Cyber Security Strategy 2023-2030 is a bold and far-reaching vision that will see Australia become a world leader. However, a lack of bipartisan agreement may undermine it. Continue reading Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

The success of Australia’s six-shield cybersecurity strategy could depend on how well the nation manages the vast pools of data that will underpin the identification and mitigation of cyberthreats. Continue reading Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

The evolution of 20 years of cybersecurity awareness

Since 2004, the White House and Congress have designated October National Cybersecurity Awareness Month. This year marks the 20th anniversary of this effort to raise awareness about the importance of cybersecurity and online safety. How have cybersecurity and malware evolved over the last two decades? What types of threat management tools surfaced and when? The […]

The post The evolution of 20 years of cybersecurity awareness appeared first on Security Intelligence.

Continue reading The evolution of 20 years of cybersecurity awareness

Cyber experts applaud the new White House cybersecurity plan

First, there was a strategy. Now, there’s a plan. The Biden Administration recently released its plan for implementing the highly anticipated national cybersecurity strategy published in March. The new National Cybersecurity Strategy Implementation Plan (NCSIP) lays out specific deadlines and responsibilities for the White House’s vision for cybersecurity. The plan is being managed by the […]

The post Cyber experts applaud the new White House cybersecurity plan appeared first on Security Intelligence.

Continue reading Cyber experts applaud the new White House cybersecurity plan

How NIST Cybersecurity Framework 2.0 Tackles Risk Management

The NIST Cybersecurity Framework 2.0 (CSF) is moving into its final stages before its 2024 implementation. After the public discussion period to inform decisions for the framework closed in May, it’s time to learn more about what to expect from the changes to the guidelines. The updated CSF is being aligned with the Biden Administration’s […]

The post How NIST Cybersecurity Framework 2.0 Tackles Risk Management appeared first on Security Intelligence.

Continue reading How NIST Cybersecurity Framework 2.0 Tackles Risk Management

The Pentagon’s 2023 cyber strategy: What you need to know

In May 2023, the Department of Defense (DoD) released an unclassified fact sheet detailing its latest cyber strategy. This latest update is another indication of the Pentagon’s intent to combat threat actors, coming fast on the heels of the 2022 National Security Strategy and the 2022 National Defense Strategy. A more complete summary of the […]

The post The Pentagon’s 2023 cyber strategy: What you need to know appeared first on Security Intelligence.

Continue reading The Pentagon’s 2023 cyber strategy: What you need to know

The Biden Administration’s 2023 Cybersecurity Strategy

The Biden Administration recently introduced a new national cybersecurity strategy, expected to aggressively address an increasingly complex and dangerous threat landscape. Improving cybersecurity may not be the top priority for the Biden Administration, but it is an issue that the White House has been focused on since the earliest days of President Biden’s tenure. For […]

The post The Biden Administration’s 2023 Cybersecurity Strategy appeared first on Security Intelligence.

Continue reading The Biden Administration’s 2023 Cybersecurity Strategy

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network […]

The post How to Solve the People Problem in Cybersecurity appeared first on Security Intelligence.

Continue reading How to Solve the People Problem in Cybersecurity

Reactive Cybersecurity: How to Get it Right

Cyberattacks happen. What you do afterward can affect your cybersecurity posture for years to come. But it can also affect your ongoing success as a business, your good name and your compliance with the laws that govern your industry. You can only realize the full benefits of cybersecurity with the one-two punch of strong proactive […]

The post Reactive Cybersecurity: How to Get it Right appeared first on Security Intelligence.

Continue reading Reactive Cybersecurity: How to Get it Right

Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way

In two previous blog posts, I shared the non-traditional cybersecurity career paths of more than a dozen professionals and how their previous life experiences shaped their security work. It’s been an honor helping to tell these individuals’ stories. We conclude this blog series with a final installment in which these same cybersecurity professionals share advice […]

The post Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way appeared first on Security Intelligence.

Continue reading Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way