Victor M. Thomas SC Media

Victor M. Thomas

Most recent articles by Victor M. Thomas

Game on: Why hackers hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the epicenter of the battle between threat actors and the organizations responsible for protection. Consumers and businesses alike are sharing more data across an ever-expanding digital landscape that includes the cloud, mobile, IoT and more. So, organizations are increasingly challenged…

Johannesburg’s power company hit by ransomware attack

The Johannesburg power company City Power was hit with a ransomware attack on July 25 which compromised its databases, applications and networks. As a result, residents of the South African economic hub were unable to purchase electricity through City Power’s prepaid vending system, leaving them without power. The issue might also impact City Power’s ability…

What are the odds? How vulnerable are you to the latest vulnerabilities?

Cybersecurity vulnerability management is a continuous race against time that is being compounded by the proliferation of new devices and applications within organizations. Between 2015 and 2019, data from exploit-db reveals that the number of distinct products with reported vulnerabilities increased by 150 percent. Over this same period, the weaponization time for the creation of…

VPN complexity cripples innovation

Long gone are the days when switchboard operators were relied upon to make phone connections. Advancements in telecommunication quickly eliminated the need for cumbersome and manual intervention. It is time we abandon the switchboard-like model that we have inherited from virtual private networks (VPNs), remove unnecessary complexity, and make room for security innovation.    Policy…

Break Up With Your Insecure VPN

The inconsistent connections and the constant feeling of insecurity cannot be forgiven or forgotten— it is time to move on and break up with your VPN. In the 90s, the VPN was all the rage in cybersecurity. The creation of the ability for a private connection on the internet between a multitude of users and…

Kill the VPN. Move to Zero Trust

We’re a modern workforce, working anywhere and everywhere. The days of a fixed and easily identifiable perimeter are long gone, meaning depending on traditional VPNs is no longer an effective or secure means for remote access. In fact, it’s dangerous. Today’s network landscape is complex and elusive with distributed applications, people, and data. Our expanding…

InFocus: SonicWall CEO Bill Conner

Illena Armstrong, VP, Editorial, chats with SonicWall CEO Bill Conner about concerning threats, non-traditional points of entry, and steps your organization can take to secure your corporate infrastructure.

The Secure Access Paradigm Shift to Zero Trust

The basic principles of securing access to critical information have not changed, but the ecosystem your information resides in has transformed significantly. Changes in business and IT operations have introduced unnecessary complexity and risk to modern enterprise. However, the time has come for organizations to change their approach to security, or risk facing the consequences…

Fundamentals for Reducing Your Attack Surface

A good boxer knows not to expose his body to his opponent. The art of his victory comes from his ability to avoid and withstand what his rival throws at him. For organizations today, reducing their attack surface inherently minimizes what an adversary can attack and their ability to strike.   The basic principles of…

Next post in Advertise