How to Provide Relevant Threat Intelligence

In the evolution of cybersecurity, the threat landscape is ever-changing while the line of defense is ever-shrinking. Security professionals started with securing the perimeters, but now we need to assume a breach in a zero-trust environment. However, providing intelligence to help users stay ahead of threats becomes a challenge when that information is overwhelmingly voluminous […]

The post How to Provide Relevant Threat Intelligence appeared first on Security Intelligence.

Continue reading How to Provide Relevant Threat Intelligence

How Relevance Scoring Can Make Your Threat Intelligence More Actionable

Relevance scoring is a technique that correlates the properties of security analysts’ threat intelligence and those of their organization, such as the industry and region.

The post How Relevance Scoring Can Make Your Threat Intelligence More Actionable appeared first on Security Intelligence.

Continue reading How Relevance Scoring Can Make Your Threat Intelligence More Actionable

How a More Connected Approach Can Help With Threat Management

Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.

The post How a More Connected Approach Can Help With Threat Management appeared first on Security Intelligence.

Continue reading How a More Connected Approach Can Help With Threat Management

Embracing the Power of Community for Better Security

Threat actors seem to do better than defenders in a key area: collaboration. To effectively fight threats, we need to collaborate as a community and reimagine security as an open construct.

The post Embracing the Power of Community for Better Security appeared first on Security Intelligence.

Continue reading Embracing the Power of Community for Better Security

Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Researchers published two pieces of exploit code that can allow anyone to interact with an organization’s SAP enterprise resource planning platform and perform unauthorized transactions.

The post Published Exploits for Accessing SAP Systems Put Security Teams on Alert appeared first on Security Intelligence.

Continue reading Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don’t require human oversight.

The post Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study appeared first on Security Intelligence.

Continue reading Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

The fourth annual “The Cyber Resilience Organization” study found that 23 percent of respondents are now using security automation, which includes both AI and machine learning, extensively.

The post Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart appeared first on Security Intelligence.

Continue reading Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart

Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

Shared security culture is now critical for organizations to prevent IT burnout and respond to emerging threats. But what does this look like in practice?

The post Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture appeared first on Security Intelligence.

Continue reading Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

Foster a Culture of Knowledge Sharing in Your Security Operations Center

To bridge the skills gap, increase efficiency and lighten the load of overwhelmed analysts, it’s imperative to encourage knowledge sharing among your security operations center team.

The post Foster a Culture of Knowledge Sharing in Your Security Operations Center appeared first on Security Intelligence.

Continue reading Foster a Culture of Knowledge Sharing in Your Security Operations Center

Think Inside the Box to Bridge the Cybersecurity Skills Gap

The threat landscape is growing more perilous each day and our white hats need all the help they can get. The problem is that many organizations are struggling to close the cybersecurity skills gap.

The post Think Inside the Box to Bridge the Cybersecurity Skills Gap appeared first on Security Intelligence.

Continue reading Think Inside the Box to Bridge the Cybersecurity Skills Gap