What Security Leaders Can Do To Stay Relevant

During this year’s Exabeam Spotlight18 conference in Las Vegas, amid the conversations about building a modern SOC or a successful insider threat program, Steve Moore, chief cybersecurity strategist at Exabeam, discussed the relevance of being relevan… Continue reading What Security Leaders Can Do To Stay Relevant

It’s Time to Adopt AI in Your Security Operations Center

If your security operations center (SOC) team is overwhelmed when it comes to cybersecurity, it’s time to consider AI to automate your time-consuming tasks.

The post It’s Time to Adopt AI in Your Security Operations Center appeared first on Security Intelligence.

Continue reading It’s Time to Adopt AI in Your Security Operations Center

How Brad Olive Fights Fires With Security Awareness

Brad Olive has been spreading security awareness since the dawn of the internet. Today he develops personalized learning road maps aimed at various roles and user types for IBM Security Academy.

The post How Brad Olive Fights Fires With Security Awareness appeared first on Security Intelligence.

Continue reading How Brad Olive Fights Fires With Security Awareness

Checkmate: How to Win the Cybersecurity Game

Some refer to information security as a war, but it’s better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.

The post Checkmate: How to Win the Cybersecurity Game appeared first on Security Intelligence.

Continue reading Checkmate: How to Win the Cybersecurity Game

Less Is More: Why CISOs Should Consolidate Their Security Tools

CISOs need a broad range of security tools to fulfill their growing list of responsibilities. The more they can consolidate these solutions, the easier they are to manage and monitor.

The post Less Is More: Why CISOs Should Consolidate Their Security Tools appeared first on Security Intelligence.

Continue reading Less Is More: Why CISOs Should Consolidate Their Security Tools

Bring These Security Metrics to Your Next Budget Meeting With the Board

By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity.

The post Bring These Security Metrics to Your Next Budget Meeting With the Board appeared first on Security Intelligence.

Continue reading Bring These Security Metrics to Your Next Budget Meeting With the Board

The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.

The post The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More appeared first on Security Intelligence.

Continue reading The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage

With support from IBM, the University of Bari Aldo Moro in Italy is developing a curriculum to help students develop the cybersecurity skills they need to work in a security operations center (SOC).

The post Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage appeared first on Security Intelligence.

Continue reading Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage

Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Today’s security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.

The post Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help appeared first on Security Intelligence.

Continue reading Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don’t know how to get the most out of their security information and event management (SIEM) solution.

The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation appeared first on Security Intelligence.

Continue reading Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation