Signing Up for Benefits? Beware of Phishing Attacks

Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.

The post Signing Up for Benefits? Beware of Phishing Attacks appeared first on Security Intelligence.

Continue reading Signing Up for Benefits? Beware of Phishing Attacks

The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy

Like the concept of vinyasa in yoga, continuous improvement is the key to establishing and maintaining an effective cybersecurity strategy.

The post The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy appeared first on Security Intelligence.

Continue reading The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy

How to Develop Next-Generation SOC Analysts, Part 1

SOC analysts don’t always come with all the certifications and skills an organization needs to protect its data. How can security leaders develop these employees into passionate, dedicated analysts?

The post How to Develop Next-Generation SOC Analysts, Part 1 appeared first on Security Intelligence.

Continue reading How to Develop Next-Generation SOC Analysts, Part 1

Webinar: Using Security Champions to build a DevSecOps culture within your organization

Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software quickly. They’ve automated manual processes and built tools into continuous integration and continuous de… Continue reading Webinar: Using Security Champions to build a DevSecOps culture within your organization

Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

It’s not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.

The post Cybersecurity Muscle Memory: Drilling for a Tight Incident Response appeared first on Security Intelligence.

Continue reading Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker

Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system.

The post Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker appeared first on Security Intelligence.

Continue reading Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

Email Security Best Practices to Help You Reel In the Threat of Phishing

Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices.

The post Email Security Best Practices to Help You Reel In the Threat of Phishing appeared first on Security Intelligence.

Continue reading Email Security Best Practices to Help You Reel In the Threat of Phishing

How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response

Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness.

The post How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response appeared first on Security Intelligence.

Continue reading How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response