Tech Stack Diversity: Security Benefits and Costs

If your remit protects the information technology estate, you might be tired of the constant fire drills and reminders of upcoming disruptions. The barrage from cybersecurity vendors claiming “we have the solution” is almost equally exhausting. Start here: there is no magic bullet cybersecurity solution. If there was, its inventor would be a gazillionaire and […]

The post Tech Stack Diversity: Security Benefits and Costs appeared first on Security Intelligence.

Continue reading Tech Stack Diversity: Security Benefits and Costs

‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as just the latest un-addressed number in the inbox. In an inbox-zero case, the latest new alert is the most urgent task. But in a backed-up, […]

The post ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue appeared first on Security Intelligence.

Continue reading ‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

How Enterprise Design Thinking Can Improve Data Security Solutions

“Design must reflect the practical and aesthetic in business, but above all … good design must primarily serve people,” said Thomas J. Watson, a man synonymous with IBM. To no one’s surprise, he was a proponent of good enterprise design. Design must serve people. It simply makes sense that a well-designed product can meet the […]

The post How Enterprise Design Thinking Can Improve Data Security Solutions appeared first on Security Intelligence.

Continue reading How Enterprise Design Thinking Can Improve Data Security Solutions

How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions

“Gartner projections show the growth in cybersecurity spending is slowing. Cybersecurity grew at 12% (CAGR) in 2018, and it is projected to decline to only 7% (CAGR) by 2023. Gartner clients are also reporting that after years of quarterly reporting on… Continue reading How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions

A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Despite ever-growing investments in security tools, the risk of a data breach remains unacceptably high. This is the starting point of a strong a business case for investing in threat intelligence.

The post A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value appeared first on Security Intelligence.

Continue reading A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

How to Make Cryptography Services Work for Your Organization

Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right. However, there’s more to cryptography than encryption, keys and certificates.

The post How to Make Cryptography Services Work for Your Organization appeared first on Security Intelligence.

Continue reading How to Make Cryptography Services Work for Your Organization

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

A bigger cybersecurity budget is a tool to address security risks, business needs and industry changes. Here are 11 statistics on CISO spending to help inform your 2020 cybersecurity budget.

The post 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget appeared first on Security Intelligence.

Continue reading 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

With IT staff struggling to keep up with help desk tickets and users drowning in a sea of passwords, organizations are looking to centralize identity and access management (IAM) in the cloud.

The post 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture appeared first on Security Intelligence.

Continue reading 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points

Reading Time: 4 minutes Companies of all sizes are turning to IDaaS vendors to help them protect systems, applications, identities and data wherever they reside — whether in the cloud, on-premises or on mobile devices.

The post How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points appeared first on Security Intelligence.

Continue reading How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade