6 Ways to Improve Your Security Posture Using Critical Security Controls

As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an essential step when it comes to evaluating the current state of security pro… Continue reading 6 Ways to Improve Your Security Posture Using Critical Security Controls

Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks

In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?

The post Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks appeared first on Security Intelligence.

Continue reading Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks

Who gets spear phished, and why?

The story of nearly every notable data breach in recent memory begins in pretty much the same way: Once upon a time, someone got spear phished… Whether it’s a government agency or a Fortune 500 company, spear phishing is a serious threat, with lo… Continue reading Who gets spear phished, and why?

French cybersecurity agency open sources security hardened CLIP OS

After developing it internally for over 10 years, the National Cybersecurity Agency of France (ANSSI) has decided to open source CLIP OS, a Linux-based operating system developed “to meet the specific needs of the [French] administration,” … Continue reading French cybersecurity agency open sources security hardened CLIP OS

What is Vulnerability Management Anyway?

Vulnerability management (VM) programs are the meat and potatoes of every comprehensive information security program. They are not optional anymore. In fact, many information security compliance, audit and risk management frameworks require organizatio… Continue reading What is Vulnerability Management Anyway?

IT security teams are being locked out of IoT projects

Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT project deployments in enterprise environments. A survey of 1,150 IT and security … Continue reading IT security teams are being locked out of IoT projects

How DevOps and CIS Security Controls Fit Together

At this point, the Center for Internet Security’s Security Controls are an industry standard for technical cyber security. The first six basic controls can prevent 85 percent of the most common cyber attacks, and even though the controls have bee… Continue reading How DevOps and CIS Security Controls Fit Together

The UK’s Minimum Cyber Security Standard: What You Need to Know

In June 2018, the UK Government, in collaboration with NCSC (National Cyber Security Centre), produced a new security standard that all Government “Departments”, including organisations, agencies, arm’s length bodies, and contractors … Continue reading The UK’s Minimum Cyber Security Standard: What You Need to Know

6 Steps for Establishing and Maintaining Digital Integrity

To create a secure digital profile, organizations need digital integrity. This principle encapsulates two things. First, it upholds the integrity of files that store operating system and application binaries, configuration data, logs and other crucial … Continue reading 6 Steps for Establishing and Maintaining Digital Integrity