Critical Infrastructure Attack Trends: What Business Leaders Should Know

Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. […]

The post Critical Infrastructure Attack Trends: What Business Leaders Should Know appeared first on Security Intelligence.

Continue reading Critical Infrastructure Attack Trends: What Business Leaders Should Know

Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks

A common challenge security teams face is ensuring their organization can continue to operate despite cyber attacks — in other words, to demonstrate their cyber resilience. Research from the Ponemon Institute acknowledges that the volume and severity of cyber attacks continues to rise, but suggests that organizations can improve their cyber resilience by a combination of process and […]

The post Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks appeared first on Security Intelligence.

Continue reading Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks

How Zero Trust Will Change Your Security Design Approach

How would Zero Trust change the way security solutions are designed and where does one even start when implementing Zero Trust principles into their architecture? Learn more here.

The post How Zero Trust Will Change Your Security Design Approach appeared first on Security Intelligence.

Continue reading How Zero Trust Will Change Your Security Design Approach

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

Placing SOAR at the heart of a security platform helps teams extend and maximize value across the ecosystem and to any security process while working in a centralized, coordinated manner.

The post Why security orchestration, automation and response (SOAR) is fundamental to a security platform appeared first on Security Intelligence.

Continue reading Why security orchestration, automation and response (SOAR) is fundamental to a security platform

Refocusing Cybersecurity Best Practices on Security Hygiene

Attackers often increase their efforts to breach networks and systems during troubling times. As organizations around the world focus on the COVID-19 pandemic, security hygiene should be a focus, too.

The post Refocusing Cybersecurity Best Practices on Security Hygiene appeared first on Security Intelligence.

Continue reading Refocusing Cybersecurity Best Practices on Security Hygiene

Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web

Cyber resilience is now critical to speeding remediation and boosting recovery after a security event. To stick the landing, enterprises must move beyond funnels and embrace web-based design.

The post Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web appeared first on Security Intelligence.

Continue reading Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Organizations can attain visibility into their operational technology (OT) environments by building out a combined OT/IT security operations center.

The post Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC appeared first on Security Intelligence.

Continue reading Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

With elevated endpoint risk and the need to respond rapidly to cybersecurity incidents, a managed detection and response (MDR) team can deploy quickly to virtually supplement your security teams.

The post COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface appeared first on Security Intelligence.

Continue reading COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

Extend Your Incident Response Program to DevOps With Security Automation

By linking security and DevOps use cases through common automation practices, security teams can better scale their ability to respond quickly and effectively to security incidents.

The post Extend Your Incident Response Program to DevOps With Security Automation appeared first on Security Intelligence.

Continue reading Extend Your Incident Response Program to DevOps With Security Automation

How Relevance Scoring Can Make Your Threat Intelligence More Actionable

Relevance scoring is a technique that correlates the properties of security analysts’ threat intelligence and those of their organization, such as the industry and region.

The post How Relevance Scoring Can Make Your Threat Intelligence More Actionable appeared first on Security Intelligence.

Continue reading How Relevance Scoring Can Make Your Threat Intelligence More Actionable