NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations

Organizations that approach privacy regulations strategically stand to gain a competitive edge when it comes to building and retaining customer trust.

The post NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations appeared first on Security Intelligence.

Continue reading NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations

From Naughty to NICE: Best Practices for K–12 Cybersecurity Education

The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training.

The post From Naughty to NICE: Best Practices for K–12 Cybersecurity Education appeared first on Security Intelligence.

Continue reading From Naughty to NICE: Best Practices for K–12 Cybersecurity Education

How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.

The post How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? appeared first on Security Intelligence.

Continue reading How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

The U.S. Department of Energy’s “Cybersecurity Strategy” document contains key principles and processes that can help organizations in all sectors improve their security posture.

The post What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy? appeared first on Security Intelligence.

Continue reading What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.

The post It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion appeared first on Security Intelligence.

Continue reading It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Choosing the Right Security Framework to Fit Your Business

By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.

The post Choosing the Right Security Framework to Fit Your Business appeared first on Security Intelligence.

Continue reading Choosing the Right Security Framework to Fit Your Business

Cybersecurity Strategy, Risk Management and List Making

A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.

The post Cybersecurity Strategy, Risk Management and List Making appeared first on Security Intelligence.

Continue reading Cybersecurity Strategy, Risk Management and List Making

Have We Been Wrong All Along About Good Password Practices?

In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.

The post Have We Been Wrong All Along About Good Password Practices? appeared first on Security Intelligence.

Continue reading Have We Been Wrong All Along About Good Password Practices?

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

To improve infrastructure security per the president’s executive order, government agencies must build trust with the private security industry.

The post Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security appeared first on Security Intelligence.

Continue reading Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Building Upon Trump’s Executive Order on Cybersecurity

President Trump’s executive order on cybersecurity sent a powerful message about the real-world implications of information security.

The post Building Upon Trump’s Executive Order on Cybersecurity appeared first on Security Intelligence.

Continue reading Building Upon Trump’s Executive Order on Cybersecurity