How a Cybersecurity Training Program Can Recruit From Inside Your Business

The cybersecurity industry is facing a shortage of trained and experienced professionals. Schools, universities and organizations are doing amazing things to encourage the next generation to pursue a cybersecurity career. However, there is still a huge cybersecurity talent shortage. With the right training, this can change. It is clear that organizations require cybersecurity training for […]

The post How a Cybersecurity Training Program Can Recruit From Inside Your Business appeared first on Security Intelligence.

Continue reading How a Cybersecurity Training Program Can Recruit From Inside Your Business

Reaching Strategic Outcomes With a Managed Detection and Response Service Provider: Part 2

This is the second in a five-part blog series on managed detection and response as it drives strategic security outcomes for businesses. In this multipart blog series, we’re exploring how an effective managed detection and response (MDR) service helps organizations achieve their goals. Specifically, we’ll examine them through the context of four key strategic security outcomes: […]

The post Reaching Strategic Outcomes With a Managed Detection and Response Service Provider: Part 2 appeared first on Security Intelligence.

Continue reading Reaching Strategic Outcomes With a Managed Detection and Response Service Provider: Part 2

Assessing Security Operation Centers Using a Balanced Scorecard

Measuring the effectiveness of a security operations center (SOC) can be a daunting task, but a balanced scorecard approach can make the task easier. Existing SOC best practice tends to focus on operational metrics, such as response and cycle times. However, a focus solely on these metrics can lead to blind spots where critical aspects […]

The post Assessing Security Operation Centers Using a Balanced Scorecard appeared first on Security Intelligence.

Continue reading Assessing Security Operation Centers Using a Balanced Scorecard

Sailing in the Sea of IoT

It’s the kind of story many of us grew up hearing: “Someday, your fridge will know what you need from the store before you do.” We didn’t worry about things like firmware or attack surface. Now, the Internet of things (IoT) enables both today’s devices and potential attacks. Today, some fridges do know what food […]

The post Sailing in the Sea of IoT appeared first on Security Intelligence.

Continue reading Sailing in the Sea of IoT

Threat Analysis: How the Rapid Evolution of Reporting Can Change Security

With the advancements in data reporting gleaned from security information and event management (SIEM) tools and adjacent solutions, every security team today can face information overload and paralysis. To gain clarity within this murk, the practice of threat analysis has emerged and continues to evolve with time. With it, security professionals can find and fix the […]

The post Threat Analysis: How the Rapid Evolution of Reporting Can Change Security appeared first on Security Intelligence.

Continue reading Threat Analysis: How the Rapid Evolution of Reporting Can Change Security

Reaching Strategic Outcomes With A Managed Detection and Response Service Provider: Part 1

This is the first in a five-part blog series on Managed Detection and Response as it drives strategic security outcomes for businesses. If there’s one thing the past decade has shown us, it’s that change happens faster than expected. Looking across the modern enterprise, we’ve seen applications become more modular and containerized and data being […]

The post Reaching Strategic Outcomes With A Managed Detection and Response Service Provider: Part 1 appeared first on Security Intelligence.

Continue reading Reaching Strategic Outcomes With A Managed Detection and Response Service Provider: Part 1

WannaCry: How the Widespread Ransomware Changed Cybersecurity

If I had polled cybersecurity experts on their way to work on May 12, 2017, most of them would have said they knew a major cybersecurity event loomed. Yet, on that day no one expected that they were walking into the perfect storm — in the form of WannaCry ransomware, the most damaging cyberattack to […]

The post WannaCry: How the Widespread Ransomware Changed Cybersecurity appeared first on Security Intelligence.

Continue reading WannaCry: How the Widespread Ransomware Changed Cybersecurity

What’s New in 2020: Gartner Market Guide for SOAR Solutions

In a security environment burdened by too many tools, a shortage of skilled staff and an increasing number of cyberattacks, automation benefits that help bring efficiency and prioritization to the security operations center (SOC) are primarily delivered through security orchestration, automation and response (SOAR) solutions. Given this, it’s no surprise that the SOAR market continues […]

The post What’s New in 2020: Gartner Market Guide for SOAR Solutions appeared first on Security Intelligence.

Continue reading What’s New in 2020: Gartner Market Guide for SOAR Solutions

How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start

A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations and capabilities. This way, the intelligence team can be ready to protect an organization with even greater knowledge in the future. Strong cybersecurity threat intelligence about who attackers […]

The post How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start appeared first on Security Intelligence.

Continue reading How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start

Autonomous Vehicle Security Needs From A Hacker’s Perspective

With connected cars becoming more common, the industry has more standards and options when it comes to autonomous vehicle security.  Adam Laurie, known in hacker circles as Major Malfunction, leads X-Force Red’s automotive testing practice. He has seen firsthand how easy it can be to compromise an autonomous vehicle if strong security processes and controls […]

The post Autonomous Vehicle Security Needs From A Hacker’s Perspective appeared first on Security Intelligence.

Continue reading Autonomous Vehicle Security Needs From A Hacker’s Perspective