Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

IBM Security General Manager Mary O’Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.

The post Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event appeared first on Security Intelligence.

Continue reading Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

What Have We Learned About Data Protection After Another Year of Breaches?

In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019?

The post What Have We Learned About Data Protection After Another Year of Breaches? appeared first on Security Intelligence.

Continue reading What Have We Learned About Data Protection After Another Year of Breaches?

Developing a Security Plan Around Consumer Data Privacy Concerns

The onus to meet the challenge of consumers’ security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.

The post Developing a Security Plan Around Consumer Data Privacy Concerns appeared first on Security Intelligence.

Continue reading Developing a Security Plan Around Consumer Data Privacy Concerns

Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.

The post Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is? appeared first on Security Intelligence.

Continue reading Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.

The post Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns appeared first on Security Intelligence.

Continue reading Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year

Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.

The post Why Proactive Data Compliance Is Imperative for Secure Digital Transformation appeared first on Security Intelligence.

Continue reading Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.

The post Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar appeared first on Security Intelligence.

Continue reading Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

Lessons From the Data Encryption Front Line: Understanding Common Threats

There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.

The post Lessons From the Data Encryption Front Line: Understanding Common Threats appeared first on Security Intelligence.

Continue reading Lessons From the Data Encryption Front Line: Understanding Common Threats

IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

IBM X-Force’s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape