IT and OT cybersecurity: A holistic approach

In the realm of cybersecurity, both information technology (IT) and operational technology (OT) present distinct challenges that organizations must navigate. Ensuring the security of these distinct domains is paramount to bolstering your overall cyber resilience. By following the best practices outlined in this article, you can minimize potential vulnerabilities and keep your security posture strong. […]

The post IT and OT cybersecurity: A holistic approach appeared first on Security Intelligence.

Continue reading IT and OT cybersecurity: A holistic approach

How to Find and Block Breached Passwords in Active Directory

Cybercriminals love passwords. They’re simple to guess, easy to steal, and can offer unfettered access to a goldmine of data to hold for ransom or sell to other cybercriminals. For those same reasons, compromised passwords are a constant headache for IT teams, who spend far longer than they’d like helping users reset them and fixing…

The post How to Find and Block Breached Passwords in Active Directory appeared first on Petri IT Knowledgebase.

Continue reading How to Find and Block Breached Passwords in Active Directory

Want a New Job? Explore Opportunities at the 10 Top US Startup Ecosystems

Written by: Kirstie McDermott
Silicon Valley is just one of a number of key US startup ecosystems fueling startups, all of which drive investment and job creation: check where new opportunities are in the US right now. Continue reading Want a New Job? Explore Opportunities at the 10 Top US Startup Ecosystems

The One Place IT Budget Cuts Can’t Touch: Cybersecurity

If IT spending is slowing, will business leaders follow a similar approach for cybersecurity budgets? Probably not. Gartner predicts that end-user spending on both security technology and services will see an annual growth rate of 11% over the next four years. And the market is anticipated to reach $267.3 billion in 2026.  Many security professionals […]

The post The One Place IT Budget Cuts Can’t Touch: Cybersecurity appeared first on Security Intelligence.

Continue reading The One Place IT Budget Cuts Can’t Touch: Cybersecurity

3 Keys to an Effective Enterprise IT Risk Management Strategy

The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data Breach report. In addition, laws are holding board members personally liable for IT security breaches and ineffective security controls, so it’s easy to see why […]

The post 3 Keys to an Effective Enterprise IT Risk Management Strategy appeared first on Security Intelligence.

Continue reading 3 Keys to an Effective Enterprise IT Risk Management Strategy

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber […]

The post U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack appeared first on Security Intelligence.

Continue reading U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

This Week in IT – Microsoft Lists is Coming to Everyone But Who Knows What It Is For?

   Microsoft announced a new preview version of Microsoft Lists for consumers and small businesses, Windows 11 is getting updates using three different kinds of feature packs, and IT security gets funding but C-level execs have no idea what they are doing. This Week in IT – Microsoft Lists is Coming to Everyone But […] Continue reading This Week in IT – Microsoft Lists is Coming to Everyone But Who Knows What It Is For?

Non-Traditional Cybersecurity Career Paths – One Experience Informs Another

In a previous article, I shared the stories of how more than a dozen cybersecurity professionals found their way into the industry. Their non-traditional cybersecurity career paths help to illustrate how personnel of all different education backgrounds and life experiences can become part of the same community. There’s no single certification, degree, qualification, job, age, […]

The post Non-Traditional Cybersecurity Career Paths – One Experience Informs Another appeared first on Security Intelligence.

Continue reading Non-Traditional Cybersecurity Career Paths – One Experience Informs Another

Remote work and its lasting impact: What our global research uncovered

The COVID-19 pandemic has not only had a profound impact on everyone across the globe; it has also fundamentally changed the way organizations function. We are nearing one and a half years since remote work became the norm and organizations …
The post … Continue reading Remote work and its lasting impact: What our global research uncovered