CISOs drive the intersection between cyber maturity and business continuity

The modern corporate landscape is marked by rapid digital change, heightened cybersecurity threats and an evolving regulatory environment. At the nexus of these pressures sits the chief information security officer (CISO), a role that has gained newfound influence and responsibility. The recent Deloitte Global Future of Cyber Survey underscores this shift, revealing that “being more […]

The post CISOs drive the intersection between cyber maturity and business continuity appeared first on Security Intelligence.

Continue reading CISOs drive the intersection between cyber maturity and business continuity

Taking the fight to the enemy: Cyber persistence strategy gains momentum

The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by […]

The post Taking the fight to the enemy: Cyber persistence strategy gains momentum appeared first on Security Intelligence.

Continue reading Taking the fight to the enemy: Cyber persistence strategy gains momentum

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025. The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025? […]

The post Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in appeared first on Security Intelligence.

Continue reading Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

The Pentagon’s 2023 cyber strategy: What you need to know

In May 2023, the Department of Defense (DoD) released an unclassified fact sheet detailing its latest cyber strategy. This latest update is another indication of the Pentagon’s intent to combat threat actors, coming fast on the heels of the 2022 National Security Strategy and the 2022 National Defense Strategy. A more complete summary of the […]

The post The Pentagon’s 2023 cyber strategy: What you need to know appeared first on Security Intelligence.

Continue reading The Pentagon’s 2023 cyber strategy: What you need to know

What You Need to Know About Data Security Heading into 2022

Every business needs an effective data security strategy. Over the past year alone, 64% of companies worldwide faced some form of cyber attack, with an average cost of $4.24 million per breach — the highest ever recorded.  Modern enterprises must ensure that their systems can resist unauthorized access, stop data breaches and remain secure (while […]

The post What You Need to Know About Data Security Heading into 2022 appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Security Heading into 2022

The Art and Strategy of Becoming More Cyber Resilient

In the military, the art of strategy is key. It teaches how to win a war through a series of battles, campaigns and tactics. In the cybersecurity world, we have been on the defensive side for as long as we can remember. We focus on frameworks and tactics such as Defense in Depth, the onion […]

The post The Art and Strategy of Becoming More Cyber Resilient appeared first on Security Intelligence.

Continue reading The Art and Strategy of Becoming More Cyber Resilient

Security by Design and NIST 800-160, Part 1: Managing Change

Building a house requires a blueprint. When it comes to building systems, National Institute of Standards and Technology’s (NIST) documents about security by design are some of the most reliable blueprints. As systems become more complex, they’re also more likely to be fragile. Meanwhile, we continue to add new devices, apps and tools into our […]

The post Security by Design and NIST 800-160, Part 1: Managing Change appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 1: Managing Change

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate technical and organizational measures. While not […]

The post Future-Proofing Data With a Data Encryption Plan appeared first on Security Intelligence.

Continue reading Future-Proofing Data With a Data Encryption Plan

How Threat Actors Are Adapting to the Cloud

With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data that can put organizations and their customers at risk if they are breached. At the same time, many organizations are still discovering best practices surrounding cloud security and incident response. […]

The post How Threat Actors Are Adapting to the Cloud appeared first on Security Intelligence.

Continue reading How Threat Actors Are Adapting to the Cloud

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift will be required to maintain cyber resilience.

The post Shift Your Cybersecurity Mindset to Maintain Cyber Resilience appeared first on Security Intelligence.

Continue reading Shift Your Cybersecurity Mindset to Maintain Cyber Resilience