To Move Forward Securely, Look Backward With Ongoing Risk Assessments

If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.

The post To Move Forward Securely, Look Backward With Ongoing Risk Assessments appeared first on Security Intelligence.

Continue reading To Move Forward Securely, Look Backward With Ongoing Risk Assessments

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with.  Today’s… Continue reading Myth-busting: Why risk assessments shouldn’t be a one-time thing

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that allowed “third-party app developers to acce… Continue reading Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

What Have We Learned About Data Protection After Another Year of Breaches?

In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019?

The post What Have We Learned About Data Protection After Another Year of Breaches? appeared first on Security Intelligence.

Continue reading What Have We Learned About Data Protection After Another Year of Breaches?

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself is bad enough, but now everyone in the office is panicking. Some will grumble about how they’re going to … Continue reading So you’ve suffered a data breach? Here’s what you do next

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together

How to Build a System Hardening Program From the Ground Up

System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.

The post How to Build a System Hardening Program From the Ground Up appeared first on Security Intelligence.

Continue reading How to Build a System Hardening Program From the Ground Up

Reimagining risk management to mitigate looming economic dangers

In a volatile market environment and with the edict to “do more with less,” many financial institutions are beginning efforts to reengineer their risk management programs, according to a new survey by Deloitte Global, with emerging technolo… Continue reading Reimagining risk management to mitigate looming economic dangers