How Relevance Scoring Can Make Your Threat Intelligence More Actionable

Relevance scoring is a technique that correlates the properties of security analysts’ threat intelligence and those of their organization, such as the industry and region.

The post How Relevance Scoring Can Make Your Threat Intelligence More Actionable appeared first on Security Intelligence.

Continue reading How Relevance Scoring Can Make Your Threat Intelligence More Actionable

7 Spring Cleaning Tasks to Improve Data Security

Data security is a daily essential, but spring cleaning offers an opportunity to check in on your current practices and make changes where necessary.

The post 7 Spring Cleaning Tasks to Improve Data Security appeared first on Security Intelligence.

Continue reading 7 Spring Cleaning Tasks to Improve Data Security

4 Principles That Should Define Your Evolving Security Operations Model

It’s never too soon to set the stage for your next-generation security operations model. Here are four important considerations to keep in mind.

The post 4 Principles That Should Define Your Evolving Security Operations Model appeared first on Security Intelligence.

Continue reading 4 Principles That Should Define Your Evolving Security Operations Model

9 Best Practices from X-Force Red for Organizations and Employees

As employers rapidly respond to the need to protect their workforce from potential exposure and spread of the novel coronavirus and the disease known as COVID-19, many of your organizations are making the very difficult decision to pivot to a work-from-home model. That means employees will be connecting to the corporate network from whichever device […]

The post 9 Best Practices from X-Force Red for Organizations and Employees appeared first on Security Intelligence.

Continue reading 9 Best Practices from X-Force Red for Organizations and Employees

Using Mystery Novel Techniques to Track Down Cyberthreats

If you consider yourself a good sleuth who can predict the end of every Agatha Christie novel, you might have a knack for discovering the origins of cyberthreats.

The post Using Mystery Novel Techniques to Track Down Cyberthreats appeared first on Security Intelligence.

Continue reading Using Mystery Novel Techniques to Track Down Cyberthreats

Grow Your Business With an Evolving Cloud Security Strategy

As the threat landscape becomes more complex every day, it is crucial that you adapt with an ever-evolving cloud security strategy.

The post Grow Your Business With an Evolving Cloud Security Strategy appeared first on Security Intelligence.

Continue reading Grow Your Business With an Evolving Cloud Security Strategy

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.

The post Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers appeared first on Security Intelligence.

Continue reading Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

Inadvertent Insider Threats Present a Unique Challenge to Organizations

While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.

The post Inadvertent Insider Threats Present a Unique Challenge to Organizations appeared first on Security Intelligence.

Continue reading Inadvertent Insider Threats Present a Unique Challenge to Organizations

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

From a threat management perspective, there is no logic in securing IT equipment while ignoring the IoT devices active in the same environment. Organizations must consider IoT devices as well.

The post In 2020, IoT Security Must Be Part of Your Threat Management Strategy appeared first on Security Intelligence.

Continue reading In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity