Doug Olenick SC Media | Page 2 of 220

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

Deepfakes and their potential impact on society

Although deepfakes have only been around for a few years, they are quickly becoming a key element in a new era of digital threats. While some teeter on the more comical side – think Will Smith turned into Cardi B on The Tonight Show – others are creating disillusionment and propelling the era of fake…

emailenvelopeicons_1216035

Malware takes down some Pitney Bowes systems

Pitney Bowes reported today that it was hit with malware that has made some files inaccessible, but stopped short of calling it a ransomware attack. Pitney Bowes said the attack has encrypted some corporate information and disrupted customer access to certain services, but at this time the company does not believe any customer or employee…

Private equity firm bids $3.9 billion for Sophos

Sophos’ board of directors has recommended to its shareholders that they accept a bid by the private equity firm Thoma Bravo to purchase the cybersecurity firm. Sophos confirmed that Thoma Bravo has bid $7.40 per share for the company totaling about $3.9 billion. Thoma Bravo, which has a history of purchasing software companies, said it…

CyberRisk Alliance appoints Malcolm Harkins to its board

Former Intel Security Chief and Cybersecurity Expert New York, NY, October 10, 2019 — CyberRisk Alliance (“CRA”), a business intelligence company serving the cybersecurity and information risk management marketplace, today announced the appointment of cybersecurity expert Malcolm Harkins to its board of directors. Harkins brings a depth of experience, a broad network, and an acute…

VPN to world: Reports of my death are greatly exaggerated

While some in the industry are making the argument that enterprises don’t need VPNs anymore (principally vendors that don’t offer VPN solutions), nothing could be further from the truth. To mangle Mark Twain’s famous quote, press reports of the death of VPN are greatly exaggerated. VPNs remain the proven and reliable method of providing protected…

How ready are you to respond to a ransomware attack?

Ransomware is by far and away the fastest growing attack method in cybercrime. It’s a trend that has only continued in 2019, with a serious uptick in the number of ransomware incidents and insurance claims in just the last couple of months. As the volume and efficacy of attacks continue on an upward trajectory, another…

Leaving behind old school security tendencies

Traditional security solutions were designed to identify threats at the perimeter of the enterprise, which was primarily defined by the network. Whether called firewall, intrusion detection system, or intrusion prevention system, these tools delivered “network-centric” solutions. Innovation was slow because activity was dictated, in large part, by the capabilities, and limitations, of available technology resources.…

Rethinking Cyberisks amid a rapidly evolving threat environment

In today’s world, it may be tempting for smaller businesses to avoid addressing cybersecurity when it’s often large, well-financed corporations that are making headlines for experiencing data breaches. That may explain why smaller businesses, a market segment where more than 50 percent of companies do not have a strategy to address IT security, are particularly…

DefCon: You cannot 'cyberhijack' an airplane, but you can still create mischief

Feds to boost scrutiny of airliner cybersecurity vulnerabilities

The Department of Homeland Security, Pentagon and Department of Transportation plan to bolster an established program that investigates airliner cybersecurity vulnerabilities. The Wall Street Journal is reporting the program would run tests on actual airplanes to probe for weaknesses, much like was done several years ago when an older Boeing 757 was put to the…

Next post in Vulnerabilities