How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network […]

The post How to Solve the People Problem in Cybersecurity appeared first on Security Intelligence.

Continue reading How to Solve the People Problem in Cybersecurity

Reactive Cybersecurity: How to Get it Right

Cyberattacks happen. What you do afterward can affect your cybersecurity posture for years to come. But it can also affect your ongoing success as a business, your good name and your compliance with the laws that govern your industry. You can only realize the full benefits of cybersecurity with the one-two punch of strong proactive […]

The post Reactive Cybersecurity: How to Get it Right appeared first on Security Intelligence.

Continue reading Reactive Cybersecurity: How to Get it Right

Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way

In two previous blog posts, I shared the non-traditional cybersecurity career paths of more than a dozen professionals and how their previous life experiences shaped their security work. It’s been an honor helping to tell these individuals’ stories. We conclude this blog series with a final installment in which these same cybersecurity professionals share advice […]

The post Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way appeared first on Security Intelligence.

Continue reading Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way

Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Speed is of the essence in digital defense. As the latest Ponemon Institute Cost of a Data Breach Report makes clear, businesses and agencies that are able to respond to and contain an incident rapidly will save millions over their slower peers. The average total cost of a data breach increased by nearly 10%, the largest […]

The post Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up appeared first on Security Intelligence.

Continue reading Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Is It Time to Rethink That Cybersecurity Data Lake?

You have probably heard the story of the kid who had everything but was still sad. Here is a tale of a CISO who has everything but is still very unhappy because she can’t quantify her organization’s cyber risk… Our CISO’s organization has invested in … Continue reading Is It Time to Rethink That Cybersecurity Data Lake?

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

If you are reading this, you may have decided to upgrade your ad-hoc cybersecurity program to be compliant with the NIST Cybersecurity Framework. Your CEO or audit committee might have asked about this, or perhaps one of your CISO-friends suggested th… Continue reading Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; a… Continue reading 5 Mistakes CISOs Make in Their Board Presentations

What NOT to Do in Your First 90 Days as a CISO

Recently, Daniel Hooper, CISO at Varo Bank asked his LinkedIn network what their recipe for the first 90 days as a CISO would be. The post got 50+ responses but one that really stood out to me (and resonated with the whole group) was what NOT to do. T… Continue reading What NOT to Do in Your First 90 Days as a CISO

Security Awareness Training: How Often Should Your Employees Get Retrained?

Almost every company has some sort of security training, along with several other training prompts to complete during the new hire process. But once initial training is complete, how often should you revisit? With the ever-changing cybersecurity lands… Continue reading Security Awareness Training: How Often Should Your Employees Get Retrained?