The Pentagon’s 2023 cyber strategy: What you need to know

In May 2023, the Department of Defense (DoD) released an unclassified fact sheet detailing its latest cyber strategy. This latest update is another indication of the Pentagon’s intent to combat threat actors, coming fast on the heels of the 2022 National Security Strategy and the 2022 National Defense Strategy. A more complete summary of the […]

The post The Pentagon’s 2023 cyber strategy: What you need to know appeared first on Security Intelligence.

Continue reading The Pentagon’s 2023 cyber strategy: What you need to know

What You Need to Know About Data Security Heading into 2022

Every business needs an effective data security strategy. Over the past year alone, 64% of companies worldwide faced some form of cyber attack, with an average cost of $4.24 million per breach — the highest ever recorded.  Modern enterprises must ensure that their systems can resist unauthorized access, stop data breaches and remain secure (while […]

The post What You Need to Know About Data Security Heading into 2022 appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Security Heading into 2022

The Art and Strategy of Becoming More Cyber Resilient

In the military, the art of strategy is key. It teaches how to win a war through a series of battles, campaigns and tactics. In the cybersecurity world, we have been on the defensive side for as long as we can remember. We focus on frameworks and tactics such as Defense in Depth, the onion […]

The post The Art and Strategy of Becoming More Cyber Resilient appeared first on Security Intelligence.

Continue reading The Art and Strategy of Becoming More Cyber Resilient

Security by Design and NIST 800-160, Part 1: Managing Change

Building a house requires a blueprint. When it comes to building systems, National Institute of Standards and Technology’s (NIST) documents about security by design are some of the most reliable blueprints. As systems become more complex, they’re also more likely to be fragile. Meanwhile, we continue to add new devices, apps and tools into our […]

The post Security by Design and NIST 800-160, Part 1: Managing Change appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 1: Managing Change

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate technical and organizational measures. While not […]

The post Future-Proofing Data With a Data Encryption Plan appeared first on Security Intelligence.

Continue reading Future-Proofing Data With a Data Encryption Plan

How Threat Actors Are Adapting to the Cloud

With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data that can put organizations and their customers at risk if they are breached. At the same time, many organizations are still discovering best practices surrounding cloud security and incident response. […]

The post How Threat Actors Are Adapting to the Cloud appeared first on Security Intelligence.

Continue reading How Threat Actors Are Adapting to the Cloud

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift will be required to maintain cyber resilience.

The post Shift Your Cybersecurity Mindset to Maintain Cyber Resilience appeared first on Security Intelligence.

Continue reading Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

How Zero Trust Will Change Your Security Design Approach

How would Zero Trust change the way security solutions are designed and where does one even start when implementing Zero Trust principles into their architecture? Learn more here.

The post How Zero Trust Will Change Your Security Design Approach appeared first on Security Intelligence.

Continue reading How Zero Trust Will Change Your Security Design Approach

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations manage a variety of changes this year, cybersecurity leaders can serve as pillars of stability by keeping communication on track and on point.

The post How Cybersecurity Leaders Can Chart the Seas of Business Communication appeared first on Security Intelligence.

Continue reading How Cybersecurity Leaders Can Chart the Seas of Business Communication

It’s Time to Take a Fresh Look at Zero Trust

A convergence of trends and technologies is making Zero Trust an increasingly necessary cybersecurity strategy.

The post It’s Time to Take a Fresh Look at Zero Trust appeared first on Security Intelligence.

Continue reading It’s Time to Take a Fresh Look at Zero Trust