Doug Olenick SC Media | Page 5 of 187

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

Small businesses beware: Cyberwar is right around the corner

Damages from cybercrime will cost $6 trillion by 2021. It’s a statistic from Cybersecurity Ventures that can’t be ignored and it’s the biggest threat facing businesses today, with reports indicating that more than 50 percent of IT decision makers are flagging phishing attacks as a top security threat. This year alone, ransomware will hit a…

election hacking

Controversy over which DMARC setting will best protect the 2020 presidential campaigns

A pair of email security firms are taking opposing positions on whether or not the 2020 presidential candidates are using secure email systems within their campaigns even though many of the candidates are using DMARC. Valimail and Agari have each issued report cards to show if the Democratic Party hopefuls learned a learned a lesson…

Further details on Wipro phishing attack revealed

The motivation behind phishing attack that struck the Indian IT consultancy firm Wipro in April may surprisingly be gift card fraud, according to a new Flashpoint report. Flashpoint researchers Jason Reaves, Joshua Platt and Allison Nixon said the far-ranging attack that hit dozens of Wipro employees gave the malicious actors access to more than 100…

From paper compliance to operational compliance

Financial services firms must prepare for the California Consumer Privacy Act, says Alex Scheinman. Data privacy has become an overarching issue top of mind to organizations across industries and geographies over the past several years. It affects every business function in an organization, from the IT department to compliance to marketing to HR, and has…

ML innovation and compliance

With machine learning, AI and privacy all becoming priority initiatives for companies, why has the data tug-of-war between IT and developers become such a challenge? The tension between data science teams and IT departments stems in part from cultural differences. Traditionally, data science is rooted in a “hacker,” outside-the-box, experimental culture while IT professionals come…

When’s the last time you looked at your incident response plan?

Security is broad. That is evident in, for example, the Security Rule within the Health Insurance Portability and Accountability Act, a central compliance concern for any organization handling the health data of U.S. citizens. That rule specifies the need for three types of protections, which it calls technical, administrative, and physical safeguards. Related to data…

DHS lists critical infrastructure areas to protect from cyberattack

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) today issued a list of the 55 areas of the nation’s critical infrastructure that it believes must be protected from cyberattacks. The National Critical Functions list was created by CISA’s National Risk Management Center and contains functions used or supported by the government and…

Huawei responds to leaks detailing NSA hack of firm's networks

Backdoors found in Huawei-supplied Vodafone equipment

Huawei Technologies is facing yet another controversy, this time after security documents from Europe’s Vodafone noted that the Chinese firm supplied the carrier with hardware laden with security issues. Vodafone said it found backdoors in the software contained in Huawei home routers and optical service nodes. Such backdoors could allow Huawei to gain access to…

5 ways hackers use digital channels to launch VIP attacks

VIP attacks target high-profile individuals like company executives, politicians, and celebrities. For enterprise businesses, executives present a critical target for hackers, usually because they have access to a vast wealth of information. Politicians are commonly targeted by hacktivists and state operators for socio-political reasons. Celebrities, by contrast, are targeted for a multitude of reasons and…

Next post in Executive Insight