7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

Reading Time: 5 minutes Black Hat USA and DEF CON revealed some shocking developments in IoT and biometric security, providing important cybersecurity lessons for enterprise security professionals.

The post 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week appeared first on Security Intelligence.

Continue reading 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan

A thorough exit plan that accounts for security during the transition from a cloud provider partnership is crucial to the integrity of your enterprise data.

The post Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan appeared first on Security Intelligence.

Continue reading Cloud Provider Relationships Don’t Last, So Protect Your Data With an Exit Plan

Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

The workforce is becoming more “invisible.” But far too many organizations still aren’t taking this into consideration during security planning.

The post Your ‘Invisible Workforce’ Needs More Visibility in Security Planning appeared first on Security Intelligence.

Continue reading Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.

The post The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility appeared first on Security Intelligence.

Continue reading The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

How to Make Third-Party Risk Management Second Nature

Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.

The post How to Make Third-Party Risk Management Second Nature appeared first on Security Intelligence.

Continue reading How to Make Third-Party Risk Management Second Nature

Why Encryption Is the Cornerstone of Your Cloud Security

When evaluating cloud providers, it’s important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.

The post Why Encryption Is the Cornerstone of Your Cloud Security appeared first on Security Intelligence.

Continue reading Why Encryption Is the Cornerstone of Your Cloud Security

The smaller, the better: Corporate CISOs turn to invite-only meetings to compare notes

If you are a chief information security officer, the best place to meet your peers may not be at the big events in Las Vegas, San Francisco, or the traveling roadshow coming through your town. It may be at the restaurant around the corner. Corporate security executives are beginning to favor exclusive, invite-only meetings where they trade ideas with other security bosses on how to protect business secrets, mainly as a way to fight the fatigue that comes from an onslaught of sales pitches. Chief information security officers at Fortune 500 firms receive hundreds of sales calls, emails and LinkedIn messages every month from vendors hawking the latest technology promising to protect them from the next major breach. But many CISOs working 60-plus hours a week don’t have time to sit down to listen to a pitch and, when they do, the technology often fails to impress. So they’re seeking […]

The post The smaller, the better: Corporate CISOs turn to invite-only meetings to compare notes appeared first on CyberScoop.

Continue reading The smaller, the better: Corporate CISOs turn to invite-only meetings to compare notes

Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.

The post Why You Should Do Your Homework Before Investing in Enterprise Blockchains appeared first on Security Intelligence.

Continue reading Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Why It’s Time to Cross Out the Checklist Approach to Vendor Security

When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.

The post Why It’s Time to Cross Out the Checklist Approach to Vendor Security appeared first on Security Intelligence.

Continue reading Why It’s Time to Cross Out the Checklist Approach to Vendor Security

Why Privileged Access Management Is Key to Preventing Insider Threats

To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors.

The post Why Privileged Access Management Is Key to Preventing Insider Threats appeared first on Security Intelligence.

Continue reading Why Privileged Access Management Is Key to Preventing Insider Threats