Trusting Security Metrics: How Well Do We Know What We Think We Know?

When it comes to security metrics, greater accuracy yeilds greater value, but complete context requires a diversity of insights. What if you can’t have both?

The post Trusting Security Metrics: How Well Do We Know What We Think We Know? appeared first on Security Intelligence.

Continue reading Trusting Security Metrics: How Well Do We Know What We Think We Know?

Why You Should Seek Out Alternative Intelligence in Your Cybersecurity Recruitment

With constantly evolving threats and a growing skills gap, the cybersecurity industry should consider alternative intelligence to enable the full digital transformation of our organizations.

The post Why You Should Seek Out Alternative Intelligence in Your Cybersecurity Recruitment appeared first on Security Intelligence.

Continue reading Why You Should Seek Out Alternative Intelligence in Your Cybersecurity Recruitment

Why Security Career Journeys Need to Start From an Early Age

Encouraging young people to pursue a security career is not just the job of the public sector. Organizations that hire security professionals also have a responsibility to help grow this talent pool.

The post Why Security Career Journeys Need to Start From an Early Age appeared first on Security Intelligence.

Continue reading Why Security Career Journeys Need to Start From an Early Age

Does Your SOC Have a Security Playbook?

By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.

The post Does Your SOC Have a Security Playbook? appeared first on Security Intelligence.

Continue reading Does Your SOC Have a Security Playbook?

3 Key Areas of Security Operations to Benchmark and Evaluate

SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.

The post 3 Key Areas of Security Operations to Benchmark and Evaluate appeared first on Security Intelligence.

Continue reading 3 Key Areas of Security Operations to Benchmark and Evaluate

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

The post Best Practices for Designing a Security Operations Center appeared first on Security Intelligence.

Continue reading Best Practices for Designing a Security Operations Center

IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem

Today we unveiled the next generation of incident response with the Resilient Incident Response Platform with Intelligent Orchestration.

The post IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem appeared first on Security Intelligence.

Continue reading IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem

IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response

Today, we are proud to announce the launch of Intelligent Orchestration with the next-generation of the Resilient Incident Response Platform (IRP).

The post IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response appeared first on Security Intelligence.

Continue reading IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response

Readying Your Security Operations for 2018 and Beyond

If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.

The post Readying Your Security Operations for 2018 and Beyond appeared first on Security Intelligence.

Continue reading Readying Your Security Operations for 2018 and Beyond

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

The post All Aboard! Applying the Security Immune System Approach to the Railroad Industry appeared first on Security Intelligence.

Continue reading All Aboard! Applying the Security Immune System Approach to the Railroad Industry