Enterprise Intelligence Brief: Threat Hunting Takes Center Stage

Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.

The post Enterprise Intelligence Brief: Threat Hunting Takes Center Stage appeared first on Security Intelligence.

Continue reading Enterprise Intelligence Brief: Threat Hunting Takes Center Stage

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Avoiding Threat Management Rookie Mistakes

Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.

The post Avoiding Threat Management Rookie Mistakes appeared first on Security Intelligence.

Continue reading Avoiding Threat Management Rookie Mistakes

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.

The post Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program appeared first on Security Intelligence.

Continue reading Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

It’s Time for the Democratization of Cybersecurity Data

The widespread democratization of cybersecurity data would enable the IT industry to keep up with cybercriminals who always seem to be one step ahead.

The post It’s Time for the Democratization of Cybersecurity Data appeared first on Security Intelligence.

Continue reading It’s Time for the Democratization of Cybersecurity Data

Threat Modeling in the Enterprise, Part 3: Understanding the Context

When evaluating overall risk in the context of threat modeling, it is important to identify the threat actors, their motivations and their capabilities.

The post Threat Modeling in the Enterprise, Part 3: Understanding the Context appeared first on Security Intelligence.

Continue reading Threat Modeling in the Enterprise, Part 3: Understanding the Context

Threat Modeling in the Enterprise, Part 2: Understanding the Process

The output of a carefully executed threat modeling exercise can be extremely valuable when informing your security control selection process.

The post Threat Modeling in the Enterprise, Part 2: Understanding the Process appeared first on Security Intelligence.

Continue reading Threat Modeling in the Enterprise, Part 2: Understanding the Process