Developing a Security Plan Around Consumer Data Privacy Concerns

The onus to meet the challenge of consumers’ security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.

The post Developing a Security Plan Around Consumer Data Privacy Concerns appeared first on Security Intelligence.

Continue reading Developing a Security Plan Around Consumer Data Privacy Concerns

6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.

The post 6 Steps Every New CISO Should Take to Set Their Organization Up for Success appeared first on Security Intelligence.

Continue reading 6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

How to get cloud security training for your team

To give your team the latest cloud security training, you need a fixed core curriculum and the flexibility to customize cloud training to each person’s needs. Whether you’re still developing your cloud adoption strategy or you’ve alre… Continue reading How to get cloud security training for your team

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year

Stay Ahead of the Growing Security Analytics Market With These Best Practices

Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity.

The post Stay Ahead of the Growing Security Analytics Market With These Best Practices appeared first on Security Intelligence.

Continue reading Stay Ahead of the Growing Security Analytics Market With These Best Practices

How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama

A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients.

The post How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama appeared first on Security Intelligence.

Continue reading How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama

In 2019, Test Impersonation Attacks

At SECOM, we perform many forms of social engineering attacks, from phishing to vishing and smishing as well as impersonation. All of these attacks are used regularly by actual attackers and should be tested as part of a robust security assessment in e… Continue reading In 2019, Test Impersonation Attacks

Data Privacy Must Evolve Beyond Confidentiality

Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.

The post Data Privacy Must Evolve Beyond Confidentiality appeared first on Security Intelligence.

Continue reading Data Privacy Must Evolve Beyond Confidentiality