Chaos Is Inevitable. Resilient Cloud Security Is the Answer

Chaos is inevitable. I studied astronomy, and one of the things that made me passionate about the field is the extremely chaotic, violent and generally difficult environment in which life began and then evolved, until some advanced primates made the i… Continue reading Chaos Is Inevitable. Resilient Cloud Security Is the Answer

Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence?

The “2019 Ponemon Institute Study on the Cyber Resilient Organization” found that although security leaders are more confident in their cyber resilience, they are still overlooking critical areas.

The post Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence? appeared first on Security Intelligence.

Continue reading Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence?

Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don’t require human oversight.

The post Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study appeared first on Security Intelligence.

Continue reading Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

The fourth annual “The Cyber Resilience Organization” study found that 23 percent of respondents are now using security automation, which includes both AI and machine learning, extensively.

The post Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart appeared first on Security Intelligence.

Continue reading Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

How to Check for Blind Spots in Your Security Program

An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

The post How to Check for Blind Spots in Your Security Program appeared first on Security Intelligence.

Continue reading How to Check for Blind Spots in Your Security Program

How the U.S. might respond if China launched a full-scale cyber attack

The U.S. financial and energy sectors are no strangers to foreign government hackers, from Iranian denial-of-service attacks on American banks to Russian reconnaissance of industrial control systems. Less familiar territory, however, is how companies would work with the U.S. government to respond to a cross-sector cyberattack during a geopolitical crisis. About 20 private executives and ex-government officials gathered last month in Washington, D.C. to take a stab at that question. A tabletop exercise hosted by the Foundation for Defense of Democracies (FDD), a think tank, hashed out what companies and federal agencies might ask of each other in the 72 hours after a disruptive series of computer intrusions. The fictional scenario involved a confrontation between the United States and China in the Taiwan Strait, which was followed by a cascading cyberattack on multiple U.S. critical infrastructure sectors. The former defense and law enforcement officials in the room discussed with their private-sector counterparts – executives […]

The post How the U.S. might respond if China launched a full-scale cyber attack appeared first on Cyberscoop.

Continue reading How the U.S. might respond if China launched a full-scale cyber attack

DHS head: ‘Relentless resilience’ will drive collaboration on cybersecurity

As the Department of Homeland Security continues to change the way it handles various cyberthreats the U.S. faces, the agency’s head said it’s focusing on making essential functions provided by critical infrastructure sectors more resilient. “Today’s cybertattacks can manifest in physical consequences and attackers are deploying cyber weapons to disrupt and destruct, requiring much more sophisticated defenses,” DHS Secretary Kirstjen Nielsen said at the SINET conference in Washington on Thursday. “Infrastructure continues to be a significant target of interest for a diverse group of threat actors. Nation-states such as Russia, China, Iran, North Korea, as well as cybercriminals, terrorist groups, and others today can initiate attacks anywhere in the world, any time.” As DHS plays a lead role in warding off the cyberthreats Nielsen described, she described focusing on protecting specific critical infrastructure assets as an outdated norm. Instead, DHS is looking to focus on protecting essential functions that are the product of multiple […]

The post DHS head: ‘Relentless resilience’ will drive collaboration on cybersecurity appeared first on Cyberscoop.

Continue reading DHS head: ‘Relentless resilience’ will drive collaboration on cybersecurity

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. Week Three in particular aims to help users fuse cybe… Continue reading NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

What Is the Current State of Cyber Resilience?

Although new research revealed that the state of cyber resilience is improving — especially regarding executive engagement — there is still room for improvement.

The post What Is the Current State of Cyber Resilience? appeared first on Security Intelligence.

Continue reading What Is the Current State of Cyber Resilience?