Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.

The post Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT appeared first on Security Intelligence.

Continue reading Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

Generation Gap: Does Your Security Awareness Program Bridge the Divide?

As more millennials enter the workforce, organizations should consider different approaches to security awareness training to account for generational knowledge gaps.

The post Generation Gap: Does Your Security Awareness Program Bridge the Divide? appeared first on Security Intelligence.

Continue reading Generation Gap: Does Your Security Awareness Program Bridge the Divide?

June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

In June’s security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.

The post June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway appeared first on Security Intelligence.

Continue reading June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

Behind the Scenes of the Science Channel Special, ‘Dark Web: Fighting Cybercrime’

IBM Security teamed up with Atomic Entertainment and Science Channel to produce a documentary about the nature of the Dark Web and innovations in the security industry.

The post Behind the Scenes of the Science Channel Special, ‘Dark Web: Fighting Cybercrime’ appeared first on Security Intelligence.

Continue reading Behind the Scenes of the Science Channel Special, ‘Dark Web: Fighting Cybercrime’

Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.

The post Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong appeared first on Security Intelligence.

Continue reading Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

The Key to Protecting Your Crown Jewels? Improve Risk Management

Experts at the 2018 RSA Conference demonstrated how increasing collaboration and accountability around cyber risk management is the best way to protect your critical assets.

The post The Key to Protecting Your Crown Jewels? Improve Risk Management appeared first on Security Intelligence.

Continue reading The Key to Protecting Your Crown Jewels? Improve Risk Management

Can a Mature Bug Bounty Program Help Solve the Security Talent Shortage?

With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.

The post Can a Mature Bug Bounty Program Help Solve the Security Talent Shortage? appeared first on Security Intelligence.

Continue reading Can a Mature Bug Bounty Program Help Solve the Security Talent Shortage?

There’s Never Been a Better Time to Consider Security Careers

Many people are intimidated by the thought of security careers. Why? They incorrectly believe security jobs require technical expertise, as well as extensive academic training and certifications.

The post There’s Never Been a Better Time to Consider Security Careers appeared first on Security Intelligence.

Continue reading There’s Never Been a Better Time to Consider Security Careers

Risk Acceptance 101: What Happens When Security Needs Go Unfunded?

The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.

The post Risk Acceptance 101: What Happens When Security Needs Go Unfunded? appeared first on Security Intelligence.

Continue reading Risk Acceptance 101: What Happens When Security Needs Go Unfunded?

When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination

A failure of imagination could cause business leaders fail to account for predictable cyber risks due to a misperception of the company’s incident response capabilities and cyber resilience posture.

The post When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination appeared first on Security Intelligence.

Continue reading When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination