4 Tips to Make the Most of Your Security Budget

Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC’s funds.

The post 4 Tips to Make the Most of Your Security Budget appeared first on Security Intelligence.

Continue reading 4 Tips to Make the Most of Your Security Budget

Organisations’ 5 biggest information security concerns

When implementing defences to keep data secure, organisations should put a lot of effort into preventing external actors penetrating them. However, as the 2018 BCI Horizon Scan Report reminds us, there are many other things to prepare for. Th… Continue reading Organisations’ 5 biggest information security concerns

How Much Can Application Isolation Save Your Organization?

How many times a day do each of your users click on a link to an unknown website? Or open an email attachment from an external sender? Bromium’s new risk assessment calculator highlights the your costs savings associated with reducing risk by iso… Continue reading How Much Can Application Isolation Save Your Organization?

Are organisations learning from cyber attacks?

Tesco Bank has just been fined £16.4m following a cyber-attack in 2016 in which customer accounts were compromised, leaving them vulnerable to theft. The attack originally came to light when the supermarket giant spotted ‘suspicious transact… Continue reading Are organisations learning from cyber attacks?

An Open Letter to Security Managers: Stop Trying to Do It All

Security managers and IT teams today often try to tackle everything in-house, even though they don’t always have the skills and resources to run an effective security program.

The post An Open Letter to Security Managers: Stop Trying to Do It All appeared first on Security Intelligence.

Continue reading An Open Letter to Security Managers: Stop Trying to Do It All

Maximize the Power of Your Open Source Application Security Testing

To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.

The post Maximize the Power of Your Open Source Application Security Testing appeared first on Security Intelligence.

Continue reading Maximize the Power of Your Open Source Application Security Testing

Education sector data breaches skyrocket

You only have to look at the headlines to see that the education sector is under attack. One in five schools and colleges have fallen victim to cyber-crime, according to research from specialist insurer Ecclesiastical. Of those affected, 71% … Continue reading Education sector data breaches skyrocket

How Analytics Can Help You Better Understand Access Risks

The increasing complexity of modern IAM makes it hard to understand your organization’s access risks. Identity analytics can help by enhancing existing processes with a rich behavioral and event data.

The post How Analytics Can Help You Better Understand Access Risks appeared first on Security Intelligence.

Continue reading How Analytics Can Help You Better Understand Access Risks

Butlin’s data breach affects 34,000 customers

Butlin’s has admitted that up to 34,000 of its customers may have been affected by a data breach. Managing Director Dermot King confirmed that Butlin’s’s database had been put at risk following “a phishing attack via an unauthor… Continue reading Butlin’s data breach affects 34,000 customers

Bromium Customers Praise Fast, Easy Deployment

“Easy to deploy and easy to use!” Every software vendor seems to use this slogan to assure prospects that once they purchase the license, the rest of the journey is going to be a breeze, and the client is going to recover their investment i… Continue reading Bromium Customers Praise Fast, Easy Deployment