Evan Schuman, Author at SC Media

Evan Schuman

Most recent articles by Evan Schuman

Going down the ransomware rabbithole

Looking for insights in modern literature to address the challenges facing CISOs might seem farfetched, but there is some logic to this. Lewis Carroll’s Alice’s Adventures in Wonderland and Through the Looking Glass illustrates the challenges posed by ransomware. While this might seem contradictory on the surface, the options and twisted logic Alice faced are…

Inside-out analytics: Solving the enigmatic insider threat

At the risk of potentially alienating a high-demand workforce that potentially can jump to a new company for seemingly minor perks such as company-paid cafeterias or flex time with little oversight, CISOs today find themselves with a challenge. In order to protect their corporations against data breach from internal and external sources, CISOs have a…

CISOs vs. the board

Security chiefs need to tell the board the truth, albeit a more palatable version of the truth. For Fortune 1000 CISOs and CSOs, reporting to their boards of directors is, at best, a complicated and disquieting situation. CISOs must be specific and technical, but not too specific nor technical. They must be honest and comprehensive,…

Rolling the Dice on AI

Man vs machine: The future of AI Fear of successful cyberattacks meets fear of unintended consequences when machine learning is your first line of defense. Evan Schuman reports. Fear can be a great motivator. If you are afraid that a human cannot make a decision fast enough to stop a cyberattack, you might opt for…

The picture of threat intelligence

The long-acknowledged core problem with threat intelligence today is the software equivalent of a Yin and Yang situation. The algorithms are smart enough to catch a massive number of log anomalies, detecting any pattern deviation that might indicate an attack attempt. That said, they are not yet smart enough to identify accurately the real threats…

Sharing is caring—and smart

If your organization is involved in critical infrastructure such as public utilities, finance, healthcare, national defense, technology, or a similar field, nation-state attackers have put a huge target on your network. Considering the sophistication and ongoing nature of attacks against your networks, it’s important to secure your infrastructure. A 1998 executive order designed to protect…

What about health care?

Thus far, we’ve focused on manufacturing and retail, but another huge area for IoT attacks is the health care vertical. In the same way that operations and facility departments are not in the habit of having light bulbs and door locks approved by IT, their hospital counterparts are not used to getting standard medical systems,…

Next post in Security News