10 Differences Between Digital Transformation Leaders and Laggards

Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind.

The post 10 Differences Between Digital Transformation Leaders and Laggards appeared first on Security Intelligence.

Continue reading 10 Differences Between Digital Transformation Leaders and Laggards

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

It’s been a long journey since the early days of cheats development, and we can currently encounter them demonstrating malware-like behavior, using anti-detection techniques and evasion features that rival rootkits and implants found in advanced persistent threats. Continue reading The cake is a lie! Uncovering the secret world of malware-like cheats in video games

How to Explain Cybersecurity and Improve User Behavior at the Same Time

Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.

The post How to Explain Cybersecurity and Improve User Behavior at the Same Time appeared first on Security Intelligence.

Continue reading How to Explain Cybersecurity and Improve User Behavior at the Same Time

A glimpse into the present state of security in robotics

Kaspersky and the research team at the University of Ghent looked deeper into how the wide use of so-called “social robots” in the future could affect humans’ private lives, their social behavior and what the cyber security takeaways from this impact are. Continue reading A glimpse into the present state of security in robotics

How Cybersecurity Salaries Fit Experience and Specialization

Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. Today, jobs are more specialized — with higher cybersecurity salaries to match.

The post How Cybersecurity Salaries Fit Experience and Specialization appeared first on Security Intelligence.

Continue reading How Cybersecurity Salaries Fit Experience and Specialization

5 Cyber Skills That Are Essential for the Security Industry’s Next Decade

The human aspect of security tools has not received nearly as much attention as the technological aspects. To get to a more secure future, we need more people with these five cyber skills.

The post 5 Cyber Skills That Are Essential for the Security Industry’s Next Decade appeared first on Security Intelligence.

Continue reading 5 Cyber Skills That Are Essential for the Security Industry’s Next Decade

How to Improve Your Board’s Oversight of Digital Transformation Efforts

A recent National Association of Corporate Directors and Marsh & McLennan Companies report offered recommendations that CISOs can use to help their organizations manage digital transformation.

The post How to Improve Your Board’s Oversight of Digital Transformation Efforts appeared first on Security Intelligence.

Continue reading How to Improve Your Board’s Oversight of Digital Transformation Efforts

Avoid Bad Security Buying Decisions

Organizations must take a strategic approach to their security buying decisions to ensure their budget is well-spent Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands… Continue reading Avoid Bad Security Buying Decisions