The Secret to a Secure Multicloud Enterprise Is Open Source

Reading Time: 3 minutes “Open” may seem like an ironic concept in cybersecurity, but open source can improve or enhance your security posture as more and more technology moves to the cloud.

The post The Secret to a Secure Multicloud Enterprise Is Open Source appeared first on Security Intelligence.

Continue reading The Secret to a Secure Multicloud Enterprise Is Open Source

Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.

The post Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design appeared first on Security Intelligence.

Continue reading Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

Industrial Control Systems Security: To Test or Not to Test?

According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?

The post Industrial Control Systems Security: To Test or Not to Test? appeared first on Security Intelligence.

Continue reading Industrial Control Systems Security: To Test or Not to Test?

Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.

The post Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness appeared first on Security Intelligence.

Continue reading Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

Here’s What You Need to Know to Secure Your IoT Projects

Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.

The post Here’s What You Need to Know to Secure Your IoT Projects appeared first on Security Intelligence.

Continue reading Here’s What You Need to Know to Secure Your IoT Projects

Creating Meaningful Diversity of Thought in the Cybersecurity Workforce

Let’s add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.

The post Creating Meaningful Diversity of Thought in the Cybersecurity Workforce appeared first on Security Intelligence.

Continue reading Creating Meaningful Diversity of Thought in the Cybersecurity Workforce