A Journey in Organizational Resilience: Supply Chain and Third Parties

The next stop on our journey focuses on those that you rely on: supply chains and third parties.  Working with external partners can be difficult. But, there is a silver lining. Recent attacks have resulted in an industry wake-up call when it comes to cybersecurity resilience. You see, the purpose of using external partners is […]

The post A Journey in Organizational Resilience: Supply Chain and Third Parties appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Supply Chain and Third Parties

Taking Threat Detection and Response to the Next Level with Open XDR

The challenges facing today’s security industry can easily be described as a perfect storm: increasingly sophisticated cyber attackers combined with the proliferation of security tools to cover an expanding attack surface driven by remote work and cloud adoption. These dynamics can lead to disconnected insights and data, putting even more pressure on the existing shortage […]

The post Taking Threat Detection and Response to the Next Level with Open XDR appeared first on Security Intelligence.

Continue reading Taking Threat Detection and Response to the Next Level with Open XDR

A Journey in Organizational Resilience: Training and Testing

We are far from a breach-free world. After all, even cybercriminals have shown their own form of resilience. For example, after a short hiatus, the ransomware group REvil came back in September 2021. Until the day we can leave our ‘cyber front door’ unlocked, any organizational resilience framework you employ needs to include a healthy […]

The post A Journey in Organizational Resilience: Training and Testing appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Training and Testing

A Journey in Organizational Cyber Resilience Part 2: Business Continuity

Keeping a business up and running during a problem takes the right people for the job. When it comes to cyber resilience through tough times, many things come down to the human factor. We focused on that in the first piece in this series, but it also makes a big difference to the second topic: […]

The post A Journey in Organizational Cyber Resilience Part 2: Business Continuity appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 2: Business Continuity

Privileged Access Management: The Future of Cyber Resilience

Attacks against critical infrastructure and government agencies have been surging. Some attackers want to extort money; others intend to steal data. But the victims all have one thing in common: they need to be able to fend off attacks and recover so they can continue to perform their functions. That’s where cyber resilience comes in, […]

The post Privileged Access Management: The Future of Cyber Resilience appeared first on Security Intelligence.

Continue reading Privileged Access Management: The Future of Cyber Resilience

A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Organizational resilience is key to good business. Sometimes confused with enterprise resilience, we use the former term instead because it applies to a business or agency of any size. Let’s take a look at how to improve employees’ cybersecurity posture by providing practical ideas they can add to their everyday habits. The result: cyber resilience […]

The post A Journey in Organizational Cyber Resilience Part 1: The Human Factor appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 1: The Human Factor

Critical Infrastructure Attack Trends: What Business Leaders Should Know

Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. […]

The post Critical Infrastructure Attack Trends: What Business Leaders Should Know appeared first on Security Intelligence.

Continue reading Critical Infrastructure Attack Trends: What Business Leaders Should Know

How AI Prevents Fatigue After Data Breaches

I have data breach fatigue. Every day, my inbox is flooded with dozens of emails about the newest data breaches and what causes them. Five years ago, I took note of every company listed and the mistakes made that led to the breach. Today, I barely skim them. How many times can I read that a […]

The post How AI Prevents Fatigue After Data Breaches appeared first on Security Intelligence.

Continue reading How AI Prevents Fatigue After Data Breaches

The Cybersecurity Ecosystem: How Did It Get So Crowded?

Peek inside any enterprise security operations center (SOC) today, and you’ll likely see a crowded and high-pressure cybersecurity ecosystem. Over the past few years, as technology evolved rapidly, attackers have developed a growing array of strategies and tactics. In response, security organizations have deployed more and more tools and point solutions, engaged with increasing numbers […]

The post The Cybersecurity Ecosystem: How Did It Get So Crowded? appeared first on Security Intelligence.

Continue reading The Cybersecurity Ecosystem: How Did It Get So Crowded?

What Is Extended Detection and Response (XDR)?

Extended detection and response (XDR) is a security solution that delivers end-to-end visibility, detection, investigation and response across multiple security layers. Core components of an XDR architecture include federation of security signals, higher-level behavioral and cross-correlated analytics, and closed-loop and highly automated responses. This creates a truly unified experience supported by a solutions architecture that […]

The post What Is Extended Detection and Response (XDR)? appeared first on Security Intelligence.

Continue reading What Is Extended Detection and Response (XDR)?