Security Practices

Security Practices | News, how-tos, features, reviews, and videos

Jamil Farshchi, CISO, Equifax
whitelisting computer security security oversight admin lockout control by metamorworks getty images

12 incident response life preserver survival disaster recovery

Cybereason launches DFIR solution to automate incident response

Vendor says new solution takes forensic-driven approach to incident response that extends deeper value to defenders.

A frowning, anxious woman looks at her phone in shock and horror.

The security user experience (SUX)

Security processes that treat the very users we protect as unwanted burdens and alienate them in the process are a path to failure.

One red umbrella stands out among a mass of black umbrellas.

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

Fragmented image of a Boeing 787 airplane represented in encrypted data.

How JetBlue creates a culture of security

VP of Security Keith Slotter and his team have tapped 600 employees across the organization as part of a Security Champions program. The result is a strengthened security presence and an employee population engaged in security.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve security hygiene and posture management

Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies.

forensics threat hunter cyber security thumbprint

Ransomware, endpoint risks are top concerns for DFIR professionals

Digital forensics incident responders worry most about ransomware, but risks associated with remote work are also top of mind.

security incident responder

ServiceNow adds new features to Major Security Incident Management Workspace

New features allow users to add their own report templates and format and configure reports based on requirements in MSIM platform designed to help teams track and resolve critical security incidents.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

8 keys to more effective vulnerability management

Wherever you are on your journey toward building vulnerability management program, these best practices will help you be more efficient and effective.

Red team  >  Hackers coordinate an attack.

Operationalizing a “think like the enemy” strategy

MITRE ATT&CK and new security technology innovation make this possible.

overlapping mobile devices

Security asset management should be buttoned down. It isn’t.

Organizations struggle to understand what assets they have and whether they are at risk. This opens the door for exploitation.

HP security

New Magnet Forensics app automates, coordinates cybersecurity response

Magnet's new application, Automate Enterprise, is designed to speed up investigation and response to cybersecurity incidents by automating basic and repetitive manual tasks, and integrating detection and post-incident tools including...

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

5 steps to run a successful cybersecurity champions program

Here's how others have launched successful cybersecurity champions programs to promote and encourage positive security cultures across an organization.

resilient resilience weed growing in desert by barcin via getty images

NIST's new cyber-resiliency guidance: 3 steps for getting started

The updated guidance provides goals and practical implementation advice, giving organizations a place to start with their cyber-resiliency efforts.

security threat - circuit board-hand knocking over a chess piece

12 steps to take when there’s an active adversary on your network

These steps will help you respond quickly, without letting a crisis turn into chaos.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

Security hygiene and posture management: A 2022 priority

Disjointed tools and manual processes provide an incomplete and unacceptable picture of cyber-risk.

Tim Fitzgerald, CISO and SVP, Arm

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.

Shared responsibility concept  >  Hands take equal shares of pie chart [partnership / teamwork]

Collective resilience: Why CISOs are embracing a new culture of openness

CISOs are finding value in information sharing among trusted, vetted sources. Here’s how they are maximizing the intelligence gathered from these channels.

A stressed businessman with head in hand sits at a desk and computer in an office workspace.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

Load More
You Might Also Like