Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort

With the realization that “we’re all in this together,” boards want to learn how their organizations are collaborating with the rest of the ecosystem in planning and testing cyber resilience.

The post Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort appeared first on Security Intelligence.

Continue reading Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort

It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

The post It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare appeared first on Security Intelligence.

Continue reading It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Drive Innovation With Your Security Strategy in 2019

As we enter the second month of 2019, organizations should make sure their security strategy accounts for emerging trends, such as the erosion of customer trust and the cybersecurity skills gap.

The post Drive Innovation With Your Security Strategy in 2019 appeared first on Security Intelligence.

Continue reading Drive Innovation With Your Security Strategy in 2019

Community Cyber-Attacks, Simulations and Cooperation — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Michael Figueroa, executive director of the Advanced Cyber Security Center (ACSC), talks about aspects of red team operations and,…
Go on to the site to read the full article
The post … Continue reading Community Cyber-Attacks, Simulations and Cooperation — CyberSpeak Podcast

Need a Sounding Board for Your Incident Response Plan? Join a Security Community

Joining a security community is a great way to get advice and feedback on your incident response plan from like-minded peers.

The post Need a Sounding Board for Your Incident Response Plan? Join a Security Community appeared first on Security Intelligence.

Continue reading Need a Sounding Board for Your Incident Response Plan? Join a Security Community

Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough

Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.

The post Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough appeared first on Security Intelligence.

Continue reading Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough

Achieve Community Immunity With Security Data Integration

With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes?

The post Achieve Community Immunity With Security Data Integration appeared first on Security Intelligence.

Continue reading Achieve Community Immunity With Security Data Integration

Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Dwell times for data compromises are still shockingly high. Understand how to detect a breach in your network to improve response and mitigation time.

The post Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently appeared first on Security Intelligence.

Continue reading Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Simplify Your Security With an Open Cloud-Based Platform

Today, we’re announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.

The post Simplify Your Security With an Open Cloud-Based Platform appeared first on Security Intelligence.

Continue reading Simplify Your Security With an Open Cloud-Based Platform

How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS

X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.

The post How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS appeared first on Security Intelligence.

Continue reading How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS