Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

Cyberattacks can cause major loss of revenue for businesses and other groups of all sizes. As a result, cybersecurity insurance is being discussed more and more. The prospect of getting money back after an attack becomes increasingly appealing. But, is it right for every organization? What are the pros and cons? Who already has it? […]

The post Cybersecurity Insurance Pros and Cons: Is it the Best Policy? appeared first on Security Intelligence.

Continue reading Cybersecurity Insurance Pros and Cons: Is it the Best Policy?

Reaching Strategic Outcomes With An MDR Service Provider: Part 4

This is the fourth in a five-part blog series on managed detection and response as it drives strategic security outcomes for businesses. More and more managed detection and response (MDR) providers need to recognize their place among multicloud platforms. Today’s businesses often have data scattered among different cloud providers. Most vendors offer cloud-based services, after […]

The post Reaching Strategic Outcomes With An MDR Service Provider: Part 4 appeared first on Security Intelligence.

Continue reading Reaching Strategic Outcomes With An MDR Service Provider: Part 4

Triage Attacks More Efficiently With AI for Cybersecurity

Think of cybersecurity like your personal health. In cybersecurity, basic cyber hygiene foils most cyber attacks. With a shortage of cyber experts, just as in medicine, finding faster and better ways to train practitioners using real-world scenarios is key. However, artificial intelligence (AI) for cybersecurity can improve a team’s response by triaging threats on its […]

The post Triage Attacks More Efficiently With AI for Cybersecurity appeared first on Security Intelligence.

Continue reading Triage Attacks More Efficiently With AI for Cybersecurity

Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit

The universe is getting smaller, and space cybersecurity is keeping up. On May 30, 2020, nearly a decade after the Space Shuttle program ended, people witnessed a first: a vehicle built as part of a public-private partnership (between SpaceX and NASA) took off into space. This development was transformational because it brought the world one […]

The post Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit appeared first on Security Intelligence.

Continue reading Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit

Cybersecurity Ethics: Establishing a Code for Your SOC

Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work.  Being part of a high-performing computer security incident response team (CSIRT) or security operations center (SOC) involves making big, intentional decisions. Increasing the maturity of your team is more than dropping a bag of shiny new tools and technology […]

The post Cybersecurity Ethics: Establishing a Code for Your SOC appeared first on Security Intelligence.

Continue reading Cybersecurity Ethics: Establishing a Code for Your SOC

Why Red Team Testing Rules the Cloud

Red team testing is a key way to help prevent data breaches today. Most cyber defense focuses on spotting openings and fixing general risks in your environment. Red teaming not only reduces risks, but also prevents possible breaches. Methods, such as threat modeling, static analysis and dynamic testing, reduce the attack surface but do not […]

The post Why Red Team Testing Rules the Cloud appeared first on Security Intelligence.

Continue reading Why Red Team Testing Rules the Cloud

5 IoT Threats To Look Out for in 2021

As we bring 2020 to a close, it’s time to look at 2021 and a new chapter in the book of cybersecurity. While there are no doubt a multitude of possible attacks, here are six types of attacks that are becoming more popular and more common among attackers using Internet of things (IoT) threats. 1. […]

The post 5 IoT Threats To Look Out for in 2021 appeared first on Security Intelligence.

Continue reading 5 IoT Threats To Look Out for in 2021

Security Management: Why Companies Need a Unified Cloud Platform

We must adapt the way we secure data to today’s needs. Working from home has increased, forcing entities and their employees to rely more on virtual private networks (VPNs), work with their security operations center (SOC) colleagues remotely and give more attention to data protection. The global pandemic has sped up emerging trends in IT and […]

The post Security Management: Why Companies Need a Unified Cloud Platform appeared first on Security Intelligence.

Continue reading Security Management: Why Companies Need a Unified Cloud Platform

SIEM Security Myths Debunked: SOC Hero or Zero?

Security information and event management (SIEM) is still integral to digital security. However, newer entrants to the market claim SIEM as we know it is dead. If this sounds familiar, you may remember the infamous statement in 2015 by the chief information security officer (CISO) of RSA, Eddie Schwartz, that SIEM was dead. It seems […]

The post SIEM Security Myths Debunked: SOC Hero or Zero? appeared first on Security Intelligence.

Continue reading SIEM Security Myths Debunked: SOC Hero or Zero?

SIEM Trends: What to Look for in a Security Analytics Provider

The authors of The Forrester Wave™ turn to a quote from ‘The Empire Strikes Back’ to sum up the direction of SIEM: “You truly belong here with us among the clouds.” Sticking with ‘Star Wars’ for guidance, we might also find some truth in ‘The Phantom Menace’: “You can’t stop change, any more than you […]

The post SIEM Trends: What to Look for in a Security Analytics Provider appeared first on Security Intelligence.

Continue reading SIEM Trends: What to Look for in a Security Analytics Provider