Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Where Is My Cybersecurity Rosetta Stone?

This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it takes planning to know what we want to say and how we want to say it. We also need to anticipate who our audience is…

The post Where Is My Cybersecurity Rosetta Stone? appeared first on Speaking of Security – The RSA Blog.

Continue reading Where Is My Cybersecurity Rosetta Stone?

The Life Cycle of a Threat Pattern

Applying a structured approach to developing and maintaining significant threat patterns is absolutely key to successfully hunting for the advanced TTPs used by many motivated threat actors. In the post, Context in Risk-Based Threat Patterns, author Demetrio Milea suggested a simple and effective method borrowed from the Software Development Life Cycle (SDLC) to design and maintain threat patterns…

The post The Life Cycle of a Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading The Life Cycle of a Threat Pattern

Cyber Crime: The Unreported Offense

On July 22, 2016 the UK’s Office for National Statistics released crime details for the year ending March 2016.  For the first time, this data included information about fraud and computer misuse offenses, which was compiled in the National Crime Survey for the first time in October 2015. While the police recorded 4.5 million offenses from March 2015 […]

The post Cyber Crime: The Unreported Offense appeared first on PhishMe.

Continue reading Cyber Crime: The Unreported Offense

Real Security for Real Life: Tools You Can (and Will) Use

We know what needs to be done for security and why we need to do it, but we are often missing steps for how to do it. We need real security for real life.

The post Real Security for Real Life: Tools You Can (and Will) Use appeared first on Security Intelligence.

Continue reading Real Security for Real Life: Tools You Can (and Will) Use