Why security products should be more actionable for users

As an active angel investor in companies that want to bring new security technology into the market, Azi Cohen is most likely to be persuaded to invest by three things: an endorsement from an external CISO, a clear go-to-market plan, and a team that kn… Continue reading Why security products should be more actionable for users

How to adopt the mindset of continuous security for security operations

In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this mindset to your security operations. Here’s a transcript of the podcast for y… Continue reading How to adopt the mindset of continuous security for security operations

20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

Today, I will be going over Control 20 from version 7 of the CIS top 20 Critical Security Controls – Penetration Tests and Red Team Exercises. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways… Continue reading 20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

The evil of vanity metrics

With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to adjust their approach to managing and analyzing that growing collection of l… Continue reading The evil of vanity metrics

Review: Advanced Persistent Security

About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli Treu Gomes is an Intelligence and Investigations Subject Matter Expert for CrowdStrike. She serves on several cybersecurity industry boards. Inside Advanced Persistent Security As businesses are finally beginning to realize that their cyber defenses can and will occasionally fail and, therefore, must continually evolve, this book couldn’t be more … More Continue reading Review: Advanced Persistent Security

Security Awareness: How to Make Your Weakest Link Part of Your Defense

A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users.

The post Security Awareness: How to Make Your Weakest Link Part of Your Defense appeared first on Security Intelligence.

Continue reading Security Awareness: How to Make Your Weakest Link Part of Your Defense

How Do You Know You’re Making Progress in Your Security Program?

When it comes to security, only perfect practice makes perfect. Still, many IT teams rush through the motions in a mad dash to show signs of progress.

The post How Do You Know You’re Making Progress in Your Security Program? appeared first on Security Intelligence.

Continue reading How Do You Know You’re Making Progress in Your Security Program?

Qualys app for IBM QRadar offers critical insight into key vulnerability metrics

At RSA Conference 2017, Qualys launched a new Qualys App for the IBM QRadar Security Intelligence Platform, which allows customers to visualize their network IT assets and vulnerabilities in real-time, and helps teams produce continuous vulnerability and risk metrics from a data analytics perspective. The new application is freely available to the security community through the IBM Security App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies. … More Continue reading Qualys app for IBM QRadar offers critical insight into key vulnerability metrics

Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data compromise, we will keep reading about them. The modern security landscape demands a process to manage and keep on the top of the ever-evolving threats and vulnerabilities. This process is known as a vulnerability management program and it is designed to identify, classify and proactively prevent … More Continue reading Components of an effective vulnerability management process

Who’s next? Shift focus and detect network attackers

Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some significant steps and be able to proclaim: “We won’t get breached again.” Preventative security cannot prevent a network intruder from penetrating a network 100% of the time. The best pen testers even guarantee that they can get into a network within two days. Prevention is still … More Continue reading Who’s next? Shift focus and detect network attackers