How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

When he’s not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.

The post How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data appeared first on Security Intelligence.

Continue reading How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

Trusting Security Metrics: How Well Do We Know What We Think We Know?

When it comes to security metrics, greater accuracy yeilds greater value, but complete context requires a diversity of insights. What if you can’t have both?

The post Trusting Security Metrics: How Well Do We Know What We Think We Know? appeared first on Security Intelligence.

Continue reading Trusting Security Metrics: How Well Do We Know What We Think We Know?

Top 5 Reasons to Attend the IBM Security Sessions at Think 2019

As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.

The post Top 5 Reasons to Attend the IBM Security Sessions at Think 2019 appeared first on Security Intelligence.

Continue reading Top 5 Reasons to Attend the IBM Security Sessions at Think 2019

5 Ways CISOs Can Improve Collaboration on Security Risks

While the CISO’s role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.

The post 5 Ways CISOs Can Improve Collaboration on Security Risks appeared first on Security Intelligence.

Continue reading 5 Ways CISOs Can Improve Collaboration on Security Risks

How to Create Better Security Awareness Content for Your Employees

Despite increased security awareness training efforts, human error is still responsible for the majority of data breaches today.

The post How to Create Better Security Awareness Content for Your Employees appeared first on Security Intelligence.

Continue reading How to Create Better Security Awareness Content for Your Employees

How to Land an Entry-Level Cybersecurity Job

Cybersecurity is still a fresh, growing and evolving industry. Finding the right entry-level cybersecurity job now can help you shape your career in this burgeoning field for years to come.

The post How to Land an Entry-Level Cybersecurity Job appeared first on Security Intelligence.

Continue reading How to Land an Entry-Level Cybersecurity Job

Does Your SOC Have a Security Playbook?

By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.

The post Does Your SOC Have a Security Playbook? appeared first on Security Intelligence.

Continue reading Does Your SOC Have a Security Playbook?

The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy

Like the concept of vinyasa in yoga, continuous improvement is the key to establishing and maintaining an effective cybersecurity strategy.

The post The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy appeared first on Security Intelligence.

Continue reading The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy

How to Develop Next-Generation SOC Analysts, Part 1

SOC analysts don’t always come with all the certifications and skills an organization needs to protect its data. How can security leaders develop these employees into passionate, dedicated analysts?

The post How to Develop Next-Generation SOC Analysts, Part 1 appeared first on Security Intelligence.

Continue reading How to Develop Next-Generation SOC Analysts, Part 1

Why Your Security Policies Could Be Failing Your Business

Over the past three decades in IT, a persistent problem lingers over even the most well-documented enterprise security policies: lackluster implementation.

The post Why Your Security Policies Could Be Failing Your Business appeared first on Security Intelligence.

Continue reading Why Your Security Policies Could Be Failing Your Business