Victor M. Thomas SC Media

Victor M. Thomas

Most recent articles by Victor M. Thomas

How to Protect Your Applications From Sophisticated Bot Attacks

Today’s sophisticated bots reside on compromised residential devices, enabling  fraudsters to blend in with legitimate user traffic across the web. These sophisticated  bots can mimic human keystrokes, mouse movement, and browser history. They look and  act like humans when they visit websites and commit fraud and abuse of applications  including account takeover attacks, automated account…

COVID-19: You won’t get a pass on cybersecurity

The COVID-19 outbreak provides ripe opportunities for criminal actors to exploit fear, uncertainty, and companies ill prepared to to secure remote workers, driven to home offices by travel restrictions and social-distancing. The first threat comes in the form of misinformation and weaponized websites and documents. Websites and apps with outbreak maps are attracting unwitting victims…

The Dearth of Skilled Cybersecurity Personnel

The cybersecurity industry is currently experiencing a shortage of trained staff in epidemic proportions.   While complex and sophisticated malware is generated in increasing numbers daily, the skilled personnel needed to prevent or remediate the ever-increasing malevolent code is simply not to be found. In 2018-2019, 53 percent of organizations reported a “problematic shortage” of cybersecurity…

Beating the Bullet: Moving Beyond EDR

How deep learning technology acts pre-emptively to stop attackers before they cause serious damage A core evaluation of artificial intelligence (AI) in cyber threat landscape indicates that AI is on the verge of overhauling the attack domain. Organizations need to be ready for the next wave of attacks because the reality on the ground will…

Managed Detection and Response:

Separating the players from the pretenders Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) addresses the fact that threat actors have increased their ability to circumvent traditional detection measures. As early as 2011, MDR emerged (uncategorized at the time) with a single guiding principal: Acknowledge that a breach…

How AI can be used for malicious purposes

The amplified efficiency of AI means that, once a system is trained and deployed, malicious AI can attack a far greater number of devices and networks more quickly and cheaply than a malevolent human actor. Given sufficient computing power, an AI system can launch many attacks, be more selective in its targets and more devastating…

The Advanced Threat Potential of Deep Learning

The objectives of Artificial Intelligence are to enhance the ability of machines to process copious amounts of data and to automate a broad range of tasks. While we’re currently enjoying many of the practical benefits of enhanced processing power such as language processing, autonomous cars or image recognition, like any capability, it can lend itself…

A Perpetual Problem: Tackling the Cybersecurity Skills Shortage

We read the overabundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and more interesting story. But first, let’s level set. This talent shortage is a well-recognized issue that grows year after year as qualified candidates become scarcer and demand grows. By 2022,…

Next post in Advertise