Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is just around the corner, which means it’s time for CISOs to evaluate their security strategy, eliminate processes that aren’t working, and adopt new cybersecurity practices and technologies.

The post Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices appeared first on Security Intelligence.

Continue reading Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

The post Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics appeared first on Security Intelligence.

Continue reading Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security

Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She’s now one of IBM Security’s top cyber intelligence experts and a dedicated role model for women in security.

The post Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security appeared first on Security Intelligence.

Continue reading Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security

Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

IBM Security General Manager Mary O’Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.

The post Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event appeared first on Security Intelligence.

Continue reading Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.

The post 6 Steps Every New CISO Should Take to Set Their Organization Up for Success appeared first on Security Intelligence.

Continue reading 6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Design Your IAM Program With Your Users in Mind

To gain the buy-in you need to make your IAM program successful, it’s important to consider your employees’ goals and needs during the design process.

The post Design Your IAM Program With Your Users in Mind appeared first on Security Intelligence.

Continue reading Design Your IAM Program With Your Users in Mind

How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management

Laurene Hummer used to answer society’s big energy questions. Now she’s helping you access your applications more easily as the “mini CEO” of IBM Security’s identity and access management offering.

The post How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management appeared first on Security Intelligence.

Continue reading How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.

The post Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns appeared first on Security Intelligence.

Continue reading Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

How to Build a System Hardening Program From the Ground Up

System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.

The post How to Build a System Hardening Program From the Ground Up appeared first on Security Intelligence.

Continue reading How to Build a System Hardening Program From the Ground Up

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage