197 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    Understanding the Media Hacks of 2017

    In this podcast, Paul Ferrillo and Chris Veltsos discuss the media hacks of 2017, emphasizing the role played by production companies and other third-party vendors.

    Think You Have Plenty of Time to Plan for GDPR? Think Again

    The deadline to achieve compliance with the General Data Protection Regulation (GDPR) is fast approaching, but many companies remain unprepared.

    At Risk: The Energy and Utilities Sector Infrastructure

    Governments and energy and utilities organizations worldwide are focusing increasingly on cybersecurity — and with good reason. Attacks on critical infrastructure such as fuel, electricity and drinking water supply carry the potential for damage...

    ‘Cracken’ Passwords with EvilMog of IBM X-Force Red

    In this podcast, X-Force Red's EvilMog discusses the latest trends in password hacking as well as his experience creating the Cracken, a powerful password-cracking rig.

    A CISO’s Guide to Obtaining Budget: Exploit Pet Projects

    This final episode of the "CISO’s Guide to Obtaining Budget" podcast series focuses on how CISOs can add security components to CAPEX projects in order to achieve their goals.

    A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)

    This episode of the "CISO’s Guide to Obtaining Budget" podcast series looks at how CISOs can use external data breach stories to show the need for increased security resources.

    A CISO’s Guide to Obtaining Budget: Consciously Cultivate Credibility

    This episode of the "CISO’s Guide to Obtaining Budget" podcast series details how a CISO should cultivate credibility over time and without major demands.

    IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

    The IBM Security immune system consists of integrated, industry-focused solutions to help clients across all sectors maximize their security investments.

    A CISO’s Guide to Obtaining Budget: Know Yourself

    This episode of the "CISO’s Guide to Obtaining Budget" podcast series highlights the value of knowing oneself and one's company before appealing for budget.

    A CISO’s Guide to Obtaining Budget: Know Your Audience

    Part two of the "CISO’s Guide to Obtaining Budget" podcast series looks at how CISOs can more effectively communicate cyber risk to other executives.