You searched for cyber | SC Media

Your search for cyber returned 640 results

Your search for cyber returned 640 results

Sort Results:

Relevant Recent
Executive Insight, Opinion, Perspectives

Achieving an audacious goal by treating cybersecurity like a science

When humans discovered and learned to ‘obey’ the laws of physics and chemistry, we began to thrive in our world.  It enabled us to make fire, build machines much stronger than ourselves, to cure diseases, to fly. What will it take for us to thrive in the world of cyberspace?  What are its laws –…
Executive Insight, Opinion

The price of bad compromises: Enterprises face critical trust gaps

As leaders, the rise of digitization and the cyber risk it presents feels like old news. We’re so inundated with cyber breach stories that we’re almost numb to them. We’re hyper-focused on the bottom line and the digital scale we need to achieve it. Yet it’s become apparent that our digital scale is creating sweeping…
Executive Insight, Opinion

How insurance CISOs can address cloud migration security concerns

The cloud is hardly new for most industries, but insurance is still in its early days with respect to widespread adoption. While solid progress is being made—a recent report from Novarica shows that more than 70% of insurers now use cloud computing (more than triple the last few years)—most have implemented it only in segments…
Executive Insight, Opinion

Bigger budgets have not entailed more security

Greater spending on cybersecurity products hasn’t entailed a better organizational security posture. Despite the millions of dollars spent by organizations year on year, the average cost of a cyberattack jumped by 50 percent between 2018 to 2019, hitting $4.6 million per incident. Labor intensive security solutions like signature-based heuristics, machine learning and threat hunting all…
Executive Insight, Opinion

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…
APTs/cyberespionage, Security News

CISA releases analysis of three Hidden Cobra malware variants

The Cybersecurity and Infrastructure Security Agency (CISA) and two other federal agencies issued malware analysis reports (MAR) for three North Korean-government operated APTs and trojans. The malware analyzed by CISA, the Department of Defense and the FBI are code-named Copperhedge, Taintedscribe and Pebbledash, all three of which are believed to be operated by the North…
Top 5 cyber risks that impact businesses.
Government/Defense, Security News

Trump cites cybersecurity concerns issuing order to protect power grid

President Trump declared a national emergency to protect the nation’s bulk-power infrastructure that stops the purchase or use of any equipment that involves a foreign adversary in any way. The declaration was part of an Executive Order signed on May 1 that stated the federal government had found that foreign adversaries are increasingly creating and…
Product Review

Tenable.io and Tenable Lumin

Tenable.io and Tenable Lumin combine to measure and manage cyber risk across attack surfaces. Together, they translate data into actionable metrics that help analysts focus resources, prioritize risks and ultimately minimize risk impact. They also continuously assess converged attack surfaces to communicate what assets exist on an environment and where such assets are located. This…
Features, Security News

Buyer beware, risk ahead

Considering a company’s cybersecurity posture should be partof M&A due diligence, but often it isn’t. Doug Olenick explainswhy that must change. Most home buyers wouldn’t think of paying top dollar for a house, no matter how beautifully designed without considering whether it sits in a crime-ridden neighborhood. Yet, venture capitalists and corporate boards, with all…
Executive Insight, Opinion

Build a data-driven defense strategy to fight cybercrime

The coronavirus pandemic is being compared to war-like conditions by the World Health Organization. We know that bad decisions and poor data (or intelligence) during a war can have serious human and economic consequences. Compare Italy, Spain and the US to Singapore, Taiwan and Hong Kong. Even though the enemy is the same, some nations…
Next post in Executive Insight