Fight Evolving Cybersecurity Threats With a One-Two-Three Punch

Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.

The post Fight Evolving Cybersecurity Threats With a One-Two-Three Punch appeared first on Security Intelligence.

Continue reading Fight Evolving Cybersecurity Threats With a One-Two-Three Punch

Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

It’s time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.

The post Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets appeared first on Security Intelligence.

Continue reading Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

5 Ways CISOs Can Improve Collaboration on Security Risks

While the CISO’s role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.

The post 5 Ways CISOs Can Improve Collaboration on Security Risks appeared first on Security Intelligence.

Continue reading 5 Ways CISOs Can Improve Collaboration on Security Risks

Forgo the FUD to Prevent the Security Breach

How fear, uncertainty and doubt feed the false belief that security breaches can’t be avoided Coming off the heels of the Facebook breach news, it might sound downright crazy to suggest that breaches can be avoided. But no organization is destin… Continue reading Forgo the FUD to Prevent the Security Breach

It’s Time to Infuse AI Into Your Endpoint Security Strategy

As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization’s endpoint security strategy.

The post It’s Time to Infuse AI Into Your Endpoint Security Strategy appeared first on Security Intelligence.

Continue reading It’s Time to Infuse AI Into Your Endpoint Security Strategy

Lessons From the Cold War: Data Security Through Obscurity

What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.

The post Lessons From the Cold War: Data Security Through Obscurity appeared first on Security Intelligence.

Continue reading Lessons From the Cold War: Data Security Through Obscurity

Dr. Chuvakin’s Prescription: ‘On Negative Pressure …’

via Anton Chuvakin, Ph.D., Research VP and Distinguished Analyst at Gartner, speaks security truth to power. Pay attention folks – your organization’s security and continued existence could very well depend on the action you take in your environments,… Continue reading Dr. Chuvakin’s Prescription: ‘On Negative Pressure …’

Transform Your Security Strategy to Avoid Digital Roadblocks

To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.

The post Transform Your Security Strategy to Avoid Digital Roadblocks appeared first on Security Intelligence.

Continue reading Transform Your Security Strategy to Avoid Digital Roadblocks

The Data Security Forecast Calls for Zero Trust

To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.

The post The Data Security Forecast Calls for Zero Trust appeared first on Security Intelligence.

Continue reading The Data Security Forecast Calls for Zero Trust