The Ugly Duckling’s Security Testing Transformation

Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he’s really one of the good guys.

The post The Ugly Duckling’s Security Testing Transformation appeared first on Security Intelligence.

Continue reading The Ugly Duckling’s Security Testing Transformation

Open Banking Is Here — Is Your Bank Positioned to Lead?

Open banking is changing the way people manage their money, transforming the relationship between customers and financial institutions.

The post Open Banking Is Here — Is Your Bank Positioned to Lead? appeared first on Security Intelligence.

Continue reading Open Banking Is Here — Is Your Bank Positioned to Lead?

Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle

Executives need an external risk adviser to help them monitor the cyber risk landscape and implement, monitor and refine security controls accordingly.

The post Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle appeared first on Security Intelligence.

Continue reading Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.

The post See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management appeared first on Security Intelligence.

Continue reading See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

Risk Governance: The True Secret Weapon of Cybersecurity

While security solutions can certainly help organizations fight ransomware and other threats, the best defense is a robust risk governance strategy.

The post Risk Governance: The True Secret Weapon of Cybersecurity appeared first on Security Intelligence.

Continue reading Risk Governance: The True Secret Weapon of Cybersecurity

Is Your Company Secure by Design? Aligning Security With Business Objectives

The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.

The post Is Your Company Secure by Design? Aligning Security With Business Objectives appeared first on Security Intelligence.

Continue reading Is Your Company Secure by Design? Aligning Security With Business Objectives

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.

The post Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program appeared first on Security Intelligence.

Continue reading Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

Eight Myths Not to Believe About Penetration Testing

Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.

The post Eight Myths Not to Believe About Penetration Testing appeared first on Security Intelligence.

Continue reading Eight Myths Not to Believe About Penetration Testing