Breaking Bad Behavior: Can AI Combat Insider Threats?

Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly.

The post Breaking Bad Behavior: Can AI Combat Insider Threats? appeared first on Security Intelligence.

Continue reading Breaking Bad Behavior: Can AI Combat Insider Threats?

How to Build a Corporate Culture of Cyber Awareness

The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

The post How to Build a Corporate Culture of Cyber Awareness appeared first on Security Intelligence.

Continue reading How to Build a Corporate Culture of Cyber Awareness

Insights From RSAC 2018: Taking the Human Element Out of Security

At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.

The post Insights From RSAC 2018: Taking the Human Element Out of Security appeared first on Security Intelligence.

Continue reading Insights From RSAC 2018: Taking the Human Element Out of Security

Getting an Earful: Convincing Employees to Care About Network Security

When scare tactics and strict security policies fall on deaf ears, CISOs must find more productive ways to educate employees about network security risks.

The post Getting an Earful: Convincing Employees to Care About Network Security appeared first on Security Intelligence.

Continue reading Getting an Earful: Convincing Employees to Care About Network Security

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.

The post Security Specialists Discuss Identity and Access Management in the Age of Ransomware appeared first on Security Intelligence.

Continue reading Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The post Cloud Security Is Not an Either/Or appeared first on Security Intelligence.

Continue reading Cloud Security Is Not an Either/Or

Securing Human Endpoints Through Cyber Situational Awareness

Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.

The post Securing Human Endpoints Through Cyber Situational Awareness appeared first on Security Intelligence.

Continue reading Securing Human Endpoints Through Cyber Situational Awareness