How to Create Value With Your (Security) Data Analytics Program

The key factor in the success of any data analytics program, security-focused or otherwise, is how efficient and business-fit the underlying data architecture is.

The post How to Create Value With Your (Security) Data Analytics Program appeared first on Security Intelligence.

Continue reading How to Create Value With Your (Security) Data Analytics Program

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

In our release of the 2020 Cost of Insider Threats report, we cover details on the cost of insider threats by industry and the tools and activities that can help reduce the risk of insider threats.

The post Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report appeared first on Security Intelligence.

Continue reading Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover

If exploited, this router vulnerability can allow a remote attacker to take control of the router’s configuration without authentication, putting personal and business data at risk.

The post TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover appeared first on Security Intelligence.

Continue reading TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover

How Mature is Your Security Automation? See the Survey Results and How You Compare.

We hear a lot about security orchestration, automation, and response.  It will help us with our security skills gap.  It will improve our operational efficiency, thus reducing mean time to detect and respond to incidents.  It will give us more time for… Continue reading How Mature is Your Security Automation? See the Survey Results and How You Compare.

The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work?

The principle of least privilege can create balance between security, risk and productivity. The benefits are clear, but how can you adopt this approach to identity and access management?

The post The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work? appeared first on Security Intelligence.

Continue reading The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work?

What Are Insider Threats and How Can You Mitigate Them?

There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose.

The post What Are Insider Threats and How Can You Mitigate Them? appeared first on Security Intelligence.

Continue reading What Are Insider Threats and How Can You Mitigate Them?

How to Make Cryptography Services Work for Your Organization

Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right. However, there’s more to cryptography than encryption, keys and certificates.

The post How to Make Cryptography Services Work for Your Organization appeared first on Security Intelligence.

Continue reading How to Make Cryptography Services Work for Your Organization

Security News: October 1, 2019 – HNN #236

Security News: October 1, 2019
The post Security News: October 1, 2019 – HNN #236 appeared first on Security Weekly. Continue reading Security News: October 1, 2019 – HNN #236

How to Take Control of Your Privileged Accounts

Privileged access management is a top concern for CISOs. Learn how to discover your organization’s privileged accounts, why you need a least privilege strategy and how to reduce risky applications.

The post How to Take Control of Your Privileged Accounts appeared first on Security Intelligence.

Continue reading How to Take Control of Your Privileged Accounts