CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

AI Security: How Human Bias Limits Artificial Intelligence

For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.  How can defenders stay ahead? To gain context about AI that goes beyond prediction, detection […]

The post AI Security: How Human Bias Limits Artificial Intelligence appeared first on Security Intelligence.

Continue reading AI Security: How Human Bias Limits Artificial Intelligence

How to Build Usability Into Your Security Program

Having solid security measures in place is a necessary condition for achieving your organization’s overarching goals, but user productivity requires both security and usability.

The post How to Build Usability Into Your Security Program appeared first on Security Intelligence.

Continue reading How to Build Usability Into Your Security Program

Does Your Security Awareness and Training Program Account for Changing Work Environments?

A shift to remote working demands security awareness and training programs quickly pinpoint an active people-centric strategy to address the needs of changing environments.

The post Does Your Security Awareness and Training Program Account for Changing Work Environments? appeared first on Security Intelligence.

Continue reading Does Your Security Awareness and Training Program Account for Changing Work Environments?

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

How Human Security Investments Created a Global Culture of Accountability at ADP

Human security is what matters during a cybersecurity crisis, where skills and muscle memory can make the difference in make-or-break moments.

The post How Human Security Investments Created a Global Culture of Accountability at ADP appeared first on Security Intelligence.

Continue reading How Human Security Investments Created a Global Culture of Accountability at ADP

We Need More Than Security Awareness to Combat Insider Threats

When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online.

The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.

Continue reading We Need More Than Security Awareness to Combat Insider Threats

Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem

Biased AI can be trained to reflect narrow human perspectives on risk. It’s time to solve our diversity problem and create teams with varied perspectives to minimize AI bias.

The post Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem appeared first on Security Intelligence.

Continue reading Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem

A Complete Guide to Hacking the 2020 RSA Conference

The 2020 RSA Conference is just around the corner. Here’s how to plan for the enormous cybersecurity conference with over 500 sessions, and 8 things you can’t miss this year.

The post A Complete Guide to Hacking the 2020 RSA Conference appeared first on Security Intelligence.

Continue reading A Complete Guide to Hacking the 2020 RSA Conference