How to Talk to Leadership About a Zero Trust Model That’s Right For You

This is the second blog in a series about zero trust. Lack of requisite budget can be a major roadblock when it comes to adding a zero trust model. Why is this so much of a problem? And, how can a SOC team make the C-suite see how zero trust helps the business? In the […]

The post How to Talk to Leadership About a Zero Trust Model That’s Right For You appeared first on Security Intelligence.

Continue reading How to Talk to Leadership About a Zero Trust Model That’s Right For You

10 Differences Between Digital Transformation Leaders and Laggards

Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind.

The post 10 Differences Between Digital Transformation Leaders and Laggards appeared first on Security Intelligence.

Continue reading 10 Differences Between Digital Transformation Leaders and Laggards

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

It’s time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.

The post Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets appeared first on Security Intelligence.

Continue reading Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror.) Every show was its own stand-alone story that took viewers into an alternate reality where things got wei… Continue reading Entering the Twilight Zone: Adventures in the Security Leader Search

Selecting a Security Leader: Don’t Get Caught in No Man’s Land

In World War I, the space between the most-forward trenches in a battle was called No Man’s Land – a place you didn’t want to be. I learned it as a tennis term. In tennis, you want to play at the net or behind the baseline. The middle… Continue reading Selecting a Security Leader: Don’t Get Caught in No Man’s Land

What Security Lessons Can Large Enterprises Learn From Small Businesses?

Large enterprises can learn crucial security lessons from small and midsized organizations — which often have a stronger culture of accountability and responsibility when it comes to data protection.

The post What Security Lessons Can Large Enterprises Learn From Small Businesses? appeared first on Security Intelligence.

Continue reading What Security Lessons Can Large Enterprises Learn From Small Businesses?

Why Security Skills Should Be Taught, Not Hired

To alleviate the cybersecurity hiring gap, CISOs should look to tap new pools of talent in adjacent industries and help new hires develop their security skills through thorough, regular training.

The post Why Security Skills Should Be Taught, Not Hired appeared first on Security Intelligence.

Continue reading Why Security Skills Should Be Taught, Not Hired

These Four Communication Tips Could Improve Your Cybersecurity Reporting

When it comes to cybersecurity reporting, CISOs must communicate security risks, priorities and initiatives in the language of business to earn the attention and respect of board directors.

The post These Four Communication Tips Could Improve Your Cybersecurity Reporting appeared first on Security Intelligence.

Continue reading These Four Communication Tips Could Improve Your Cybersecurity Reporting

The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

Human error, credential misuse and disgruntled employees aren’t the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.

The post The Inadvertent Insider Threat: A CISO Confronts a Breach From Within appeared first on Security Intelligence.

Continue reading The Inadvertent Insider Threat: A CISO Confronts a Breach From Within