Victor M. Thomas SC Media

Victor M. Thomas

Most recent articles by Victor M. Thomas

How AI can be used for malicious purposes

The amplified efficiency of AI means that, once a system is trained and deployed, malicious AI can attack a far greater number of devices and networks more quickly and cheaply than a malevolent human actor. Given sufficient computing power, an AI system can launch many attacks, be more selective in its targets and more devastating…

The Advanced Threat Potential of Deep Learning

The objectives of Artificial Intelligence are to enhance the ability of machines to process copious amounts of data and to automate a broad range of tasks. While we’re currently enjoying many of the practical benefits of enhanced processing power such as language processing, autonomous cars or image recognition, like any capability, it can lend itself…

A Perpetual Problem: Tackling the Cybersecurity Skills Shortage

We read the overabundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and more interesting story. But first, let’s level set. This talent shortage is a well-recognized issue that grows year after year as qualified candidates become scarcer and demand grows. By 2022,…

Today’s threat trend:

The rise of file-less attacks Cyber criminals are constantly looking for new and sophisticated ways in which to avoid being detected and successfully perform their malicious attacks. This was most evident in the past few years, apart from the rise in ransomware attacks, there has also been an increase in the number of file-less attacks.…

Game on: Why hackers hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the epicenter of the battle between threat actors and the organizations responsible for protection. Consumers and businesses alike are sharing more data across an ever-expanding digital landscape that includes the cloud, mobile, IoT and more. So, organizations are increasingly challenged…

Johannesburg’s power company hit by ransomware attack

The Johannesburg power company City Power was hit with a ransomware attack on July 25 which compromised its databases, applications and networks. As a result, residents of the South African economic hub were unable to purchase electricity through City Power’s prepaid vending system, leaving them without power. The issue might also impact City Power’s ability…

What are the odds? How vulnerable are you to the latest vulnerabilities?

Cybersecurity vulnerability management is a continuous race against time that is being compounded by the proliferation of new devices and applications within organizations. Between 2015 and 2019, data from exploit-db reveals that the number of distinct products with reported vulnerabilities increased by 150 percent. Over this same period, the weaponization time for the creation of…

VPN complexity cripples innovation

Long gone are the days when switchboard operators were relied upon to make phone connections. Advancements in telecommunication quickly eliminated the need for cumbersome and manual intervention. It is time we abandon the switchboard-like model that we have inherited from virtual private networks (VPNs), remove unnecessary complexity, and make room for security innovation.    Policy…

Break Up With Your Insecure VPN

The inconsistent connections and the constant feeling of insecurity cannot be forgiven or forgotten— it is time to move on and break up with your VPN. In the 90s, the VPN was all the rage in cybersecurity. The creation of the ability for a private connection on the internet between a multitude of users and…

Kill the VPN. Move to Zero Trust

We’re a modern workforce, working anywhere and everywhere. The days of a fixed and easily identifiable perimeter are long gone, meaning depending on traditional VPNs is no longer an effective or secure means for remote access. In fact, it’s dangerous. Today’s network landscape is complex and elusive with distributed applications, people, and data. Our expanding…

Next post in Advertise