Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?
 In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be …
The post Are you listening to your logs? Part 4: … Continue reading Are you listening to your logs? Part 4: Open ports

How to stop rampant, poor password practices

We’ve all heard about the consequences of poor password practices again and again. Yet, users still reuse their passwords for multiple accounts, create weak passwords, or use dictionary words and compromised passwords. Why do users still follow these … Continue reading How to stop rampant, poor password practices

Addressing the Cloud Security Readiness Gap

Cloud security is about much more than security functionality. The top cloud providers all seem to have a capable suite of security features and most surveyed organizations report that they see all the top cloud platforms as generally secure. So, why d… Continue reading Addressing the Cloud Security Readiness Gap

Your Newest Cybersecurity Professional Is Already in Your Company

The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021. The cybersecurity profession hit a 0% unemployment rate and the pay is good. So, why are security leaders struggling to fill positions? It could be because they are […]

The post Your Newest Cybersecurity Professional Is Already in Your Company appeared first on Security Intelligence.

Continue reading Your Newest Cybersecurity Professional Is Already in Your Company

Tips to Help Secure a Remote Workforce

Increasing security of your remote employees is crucial to the security and integrity of your systems and data With the COVID-19 pandemic creating what appears to be the new normal, IT and security teams across nearly every industry continue to face u… Continue reading Tips to Help Secure a Remote Workforce

The Next Normal Brings Opportunities and Challenges for the CISO

As the world attempts to reopen and businesses plan for their next normal, one industry insider shares what security challenges the CISO will face and what changes are coming in the future.
The post The Next Normal Brings Opportunities and Challenges f… Continue reading The Next Normal Brings Opportunities and Challenges for the CISO

Winning at Vulnerability Management: 8 Best Practices

To pre-empt cybersecurity threats, today’s enterprises must have policies, processes and tools in place to not only defend against attacks but also strengthen their security posture by reducing organizational risk. Vulnerability management (VM) progra… Continue reading Winning at Vulnerability Management: 8 Best Practices