Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

IBM Security General Manager Mary O’Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.

The post Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event appeared first on Security Intelligence.

Continue reading Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

How to Build a System Hardening Program From the Ground Up

System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.

The post How to Build a System Hardening Program From the Ground Up appeared first on Security Intelligence.

Continue reading How to Build a System Hardening Program From the Ground Up

Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.

The post Why Proactive Data Compliance Is Imperative for Secure Digital Transformation appeared first on Security Intelligence.

Continue reading Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

Why Is the Retail Industry Still Lacking Security?

A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season?

The post Why Is the Retail Industry Still Lacking Security? appeared first on Security Intelligence.

Continue reading Why Is the Retail Industry Still Lacking Security?

How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.

The post How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? appeared first on Security Intelligence.

Continue reading How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

Just three years ago Ben Goodrich graduated with a degree in physics. Today he’s a security consultant working with the world’s biggest companies to provide an injection of cybersecurity expertise.

The post How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity appeared first on Security Intelligence.

Continue reading How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.

The post These 5 Types of Insider Threats Could Lead to Costly Data Breaches appeared first on Security Intelligence.

Continue reading These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Bring These Security Metrics to Your Next Budget Meeting With the Board

By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity.

The post Bring These Security Metrics to Your Next Budget Meeting With the Board appeared first on Security Intelligence.

Continue reading Bring These Security Metrics to Your Next Budget Meeting With the Board

Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

Given the increasingly sophisticated and interconnected nature of the cyberthreat landscape, organizations must collaborate across sectors to improve cyber resilience around the world.

The post Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook appeared first on Security Intelligence.

Continue reading Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines

The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.

The post Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines appeared first on Security Intelligence.

Continue reading Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines