Coding bootcamps need to get real about secure coding practices

Coding bootcamps fill development seats fast—but the trade-off for speed is security. How do you fill the security training gaps in your developers’ education? It’s no secret that the world of software development has been thrust into… Continue reading Coding bootcamps need to get real about secure coding practices

To Move Forward Securely, Look Backward With Ongoing Risk Assessments

If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.

The post To Move Forward Securely, Look Backward With Ongoing Risk Assessments appeared first on Security Intelligence.

Continue reading To Move Forward Securely, Look Backward With Ongoing Risk Assessments

Foster a Culture of Knowledge Sharing in Your Security Operations Center

To bridge the skills gap, increase efficiency and lighten the load of overwhelmed analysts, it’s imperative to encourage knowledge sharing among your security operations center team.

The post Foster a Culture of Knowledge Sharing in Your Security Operations Center appeared first on Security Intelligence.

Continue reading Foster a Culture of Knowledge Sharing in Your Security Operations Center

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.

The post Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches appeared first on Security Intelligence.

Continue reading Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line

How you respond to a data breach matters. What qualities do the most elite incident response teams possess? The IBM X-Force IRIS team shares its lessons from the front line.

The post 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line appeared first on Security Intelligence.

Continue reading 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line

Social-Engineer Newsletter Vol 09 – Issue 114

In This Issue: “Smile, Facial Recognition in Use.” Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used maliciously through social e… Continue reading Social-Engineer Newsletter Vol 09 – Issue 114

Are Your Employees Really Engaging With Security Awareness Training?

Without security awareness training, security will not be front of mind for your end users — but that doesn’t mean that companies with formal programs are effectively engaging their employees.

The post Are Your Employees Really Engaging With Security Awareness Training? appeared first on Security Intelligence.

Continue reading Are Your Employees Really Engaging With Security Awareness Training?

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

How to Convince Employees to Care About Security Training

When they’re trying to motivate employees to practice better security, C-suite executives will hail their staff as the first line of defense a company has against hackers and cybercriminals. What they often mean, unfortunately, is that employees’ poor… Continue reading How to Convince Employees to Care About Security Training

Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence.

Continue reading Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security