How Do You Secure a Smart City?

Cybersecurity investments are rarely discussed during a smart city’s strategic process. As smart cities become more complex, governments may be forced to play a continuous game of catch-up.

The post How Do You Secure a Smart City? appeared first on Security Intelligence.

Continue reading How Do You Secure a Smart City?

What Does Good Cyber Resilience Look Like in 2019?

Reading Time: 4 minutes As cyber risks increase, cyber resilience in 2019 requires the establishment of measurable baselines and the implementation of tools, such as the NIST Cybersecurity Framework, to minimize risk.

The post What Does Good Cyber Resilience Look Like in 2019? appeared first on Security Intelligence.

Continue reading What Does Good Cyber Resilience Look Like in 2019?

Everything Is Best When It Comes to Cybersecurity Best Practices

How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities?

The post Everything Is Best When It Comes to Cybersecurity Best Practices appeared first on Security Intelligence.

Continue reading Everything Is Best When It Comes to Cybersecurity Best Practices

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

Continue reading An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together

Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines

The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.

The post Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines appeared first on Security Intelligence.

Continue reading Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1