How to Design and Roll Out a Threat Model for Cloud Security

Today’s cloud security requires a new way of looking at threat models. Making a threat model can support your security teams before problems start. It helps them develop a strategy for handling existing risks, instead of detecting incidents at a later stage. Let’s walk through how to create a threat model that works for your […]

The post How to Design and Roll Out a Threat Model for Cloud Security appeared first on Security Intelligence.

Continue reading How to Design and Roll Out a Threat Model for Cloud Security

How to Design and Roll Out a Threat Model for Cloud Security

Today’s cloud security requires a new way of looking at threat models. Making a threat model can support your security teams before problems start. It helps them develop a strategy for handling existing risks, instead of detecting incidents at a later stage. Let’s walk through how to create a threat model that works for your […]

The post How to Design and Roll Out a Threat Model for Cloud Security appeared first on Security Intelligence.

Continue reading How to Design and Roll Out a Threat Model for Cloud Security

AI Security: How Human Bias Limits Artificial Intelligence

For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.  How can defenders stay ahead? To gain context about AI that goes beyond prediction, detection […]

The post AI Security: How Human Bias Limits Artificial Intelligence appeared first on Security Intelligence.

Continue reading AI Security: How Human Bias Limits Artificial Intelligence

Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know if she’s already been crawling or today marks the first time. If this is the […]

The post Turning Down the Noise: Adding Context to the SIEM With Modern Data Security appeared first on Security Intelligence.

Continue reading Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about the prospect of a third-party data breach. Sitter is the senior director of information security at Juniper Networks. He manages all things incident response-related — […]

The post Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach appeared first on Security Intelligence.

Continue reading Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

How Vulnerability Management Can Stop a Data Breach

Vulnerability management may not be the sexiest topic. But, while buzzier topics are certainly important, vulnerability management may just be the key to an effective data security strategy. According to a Ponemon Institute report, 42% of nearly 2,000 surveyed IT and security workers indicated that they had suffered a data breach in the last two […]

The post How Vulnerability Management Can Stop a Data Breach appeared first on Security Intelligence.

Continue reading How Vulnerability Management Can Stop a Data Breach

What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally transformative vision. Tech can sometimes drown in buzzwords. What do modernization and vision actually refer to? And what do modern data security solutions really require?  Both terms refer to end-to-end data security for those organizations […]

The post What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond appeared first on Security Intelligence.

Continue reading What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

Software Composition Analysis: Developers’ Security Silver Bullet

Security experts are always looking for a silver bullet. New products promise to resolve all your issues. Typically, these products overpromise to expand market share. Most attacks we see these days occur not because of genius attacks. Instead, they’re due to the company not following the simplest defensive practices. Keeping patches up-to-date and having strong […]

The post Software Composition Analysis: Developers’ Security Silver Bullet appeared first on Security Intelligence.

Continue reading Software Composition Analysis: Developers’ Security Silver Bullet

IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021

How can organizations keep up with today’s evolving threat landscape, highlighted by targeted phishing attacks, profit-seeking ransomware and advanced persistent threats (APTs)? The simple answer is better threat intelligence. Please stop me if this is something you’ve heard before. As cyberattacks continue to become more wide-ranging and complex, so too has the type of threat […]

The post IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021 appeared first on Security Intelligence.

Continue reading IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021

Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors. As a result, it’s worth taking stock of current security systems and services to see what’s working, what isn’t and where operations can be improved. But how do businesses begin? […]

The post Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan appeared first on Security Intelligence.

Continue reading Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan