3 Keys to an Effective Enterprise IT Risk Management Strategy

The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data Breach report. In addition, laws are holding board members personally liable for IT security breaches and ineffective security controls, so it’s easy to see why […]

The post 3 Keys to an Effective Enterprise IT Risk Management Strategy appeared first on Security Intelligence.

Continue reading 3 Keys to an Effective Enterprise IT Risk Management Strategy

Switching to 5G? Know Your Integrated Security Controls

5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content delivery and digital engagement anywhere. It enables businesses with new use cases and integrated security needs to have a trusted network and application/data delivery function. How does one build a secure 5G network that provides […]

The post Switching to 5G? Know Your Integrated Security Controls appeared first on Security Intelligence.

Continue reading Switching to 5G? Know Your Integrated Security Controls

A Journey in Organizational Resilience: Insider Threats

Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is why: because as we noted in the first piece of this series, you want to be able to bend while others break. An insider threat […]

The post A Journey in Organizational Resilience: Insider Threats appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Insider Threats

Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds

IBM X-Force has been tracking the activity of ITG23, a prominent cybercrime gang also known as the TrickBot Gang and Wizard Spider. Researchers are seeing an aggressive expansion of the gang’s malware distribution channels, infecting enterprise users with Trickbot and BazarLoader. This move is leading to more ransomware attacks — particularly ones using the Conti […]

The post Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds appeared first on Security Intelligence.

Continue reading Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds

XDR: The Next Step in Threat Detection and Response

The global EDR market (Endpoint Detection and Response) is growing rapidly. The Transparency Market Research team predicted that this market will increase at a CAGR of about 21% in the next decade, reported Help Net Security. If it happens, this … Continue reading XDR: The Next Step in Threat Detection and Response

Spend Wisely (Not Just More) to Become Cyber Resilient

Spending on cybersecurity is hitting record highs. And that makes sense. Because of big changes in how work gets done (plus the rising cost of breaches and attacks, like ransomware), companies are spending more than ever. But simply throwing money at the problem in order to try to become more cyber resilient is not a […]

The post Spend Wisely (Not Just More) to Become Cyber Resilient appeared first on Security Intelligence.

Continue reading Spend Wisely (Not Just More) to Become Cyber Resilient

CISO Stories Podcast: Managing the Security Product Salesperson

CISOs are approached frequently by salespersons seeking to sell products that are supposed to reduce risk. How should a CISO manage these relationships? Kevin Morrison, CISO at Alaska Air Group, joins the podcast to discuss strategies for dealing… Continue reading CISO Stories Podcast: Managing the Security Product Salesperson

What the Growing Costs of a Data Breach Means for the Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, in… Continue reading What the Growing Costs of a Data Breach Means for the Business

Malicious Life Podcast: The State of Credit Card Security

In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US (listen to Part 1, Part 2 and Part 3), credit cards were still very insecure: magnetic stripes and signed receipts did little to stop smart hacker… Continue reading Malicious Life Podcast: The State of Credit Card Security

CISO Stories Podcast: Ransomware Attacks and the True Cost to Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, in… Continue reading CISO Stories Podcast: Ransomware Attacks and the True Cost to Business