Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo

Reading Time: 5 minutes One of the hardest — and most rewarding — lessons I learned during my first bid as a graduate security architect was to back my suggestions with confidence, but know when to back off.

The post Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo appeared first on Security Intelligence.

Continue reading Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo

Avoid Bad Security Buying Decisions

Organizations must take a strategic approach to their security buying decisions to ensure their budget is well-spent Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands… Continue reading Avoid Bad Security Buying Decisions

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Is Staff Burnout the Best Reason to Implement Cybersecurity AI?

Reading Time: 4 minutes Staff burnout in the cybersecurity industry is at worrisome levels. With more data production and next-generation technology around the corner, now may be the best time to implement cybersecurity AI.

The post Is Staff Burnout the Best Reason to Implement Cybersecurity AI? appeared first on Security Intelligence.

Continue reading Is Staff Burnout the Best Reason to Implement Cybersecurity AI?

WhiteHat Report: DevSecOps Adoption on the Rise

More organizations have embraced best DevSecOps practices, according to a report published by WhiteHat Security, a subsidiary of NTT Security focused on application security. However, the report also notes that although more vulnerabilities are being … Continue reading WhiteHat Report: DevSecOps Adoption on the Rise

Threat Intelligence Is the SOC’s Road Map to DNS Security

Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.

The post Threat Intelligence Is the SOC’s Road Map to DNS Security appeared first on Security Intelligence.

Continue reading Threat Intelligence Is the SOC’s Road Map to DNS Security

The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens

While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems?

The post The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens appeared first on Security Intelligence.

Continue reading The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens

Rethinking the Industry’s Approach to the Cybersecurity Skills Gap

Until now, we’ve looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it’s time we look at the skills gap problem in different ways.

The post Rethinking the Industry’s Approach to the Cybersecurity Skills Gap appeared first on Security Intelligence.

Continue reading Rethinking the Industry’s Approach to the Cybersecurity Skills Gap

Level Up Security Operations With Threat Intelligence Cheat Codes

Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security.

The post Level Up Security Operations With Threat Intelligence Cheat Codes appeared first on Security Intelligence.

Continue reading Level Up Security Operations With Threat Intelligence Cheat Codes

Among Cybersecurity Pros, Security Paranoia Runs Deep

Cybersecurity pros are a paranoid bunch, at least according to a survey Lastline conducted at the RSA Conference in March. It makes sense when you think about it. After all, these are the folks who know what the threats are and how easily it is to gai… Continue reading Among Cybersecurity Pros, Security Paranoia Runs Deep