SC Media Editorial | IT Security

Editorial

Not every insider threat is malicious, but all are dangerous

As companies fall victim to increased insider threats, one of the greatest casualties has become trust in coworkers. Where one used to think primarily about threats to network security as coming from external intruders, today CISOs need to contend with the increasing likelihood that the threat actor might be a colleague — perhaps someone close…

Automated security services essential for cloud security

Securing the cloud requires a different mindset than securing your on-prem infrastructure Enterprise cloud operations are expanding and maturing, but as with any natural maturation, inevitable growing pains must be endured and overcome. As organizations increasingly migrate operations to the cloud providers, security experts rapidly are realizing that automated cloud security services are essential to…

No ID? Get off my cloud

Cloud-based IAM puts authentication to the test Traditional brick-and-mortar organizations with on-premise servers are striving every day to keep pace with cloud-driven digital enterprises that are untethered by physical restraints, enabling employees to work from anywhere, accessing applications, services and mobile devices as regular parts of their flexible workdays. However, much like ducks on the…

CISOs vs. the board

Security chiefs need to tell the board the truth, albeit a more palatable version of the truth. For Fortune 1000 CISOs and CSOs, reporting to their boards of directors is, at best, a complicated and disquieting situation. CISOs must be specific and technical, but not too specific nor technical. They must be honest and comprehensive,…

The mighty microservice

Taking containers to the next level Microservices: Containers on steroids As container technology continues to evolve from its earliest days on UNIX, it has found its way into new uses and deployments, inspired by the imagination and creativity of software developers and IT engineers. With the birth and development of the next generation of container…

Manipulating human nature

Breaking bad and good habits Understanding social engineering is the first step to overcoming it. Danny Bradbury reports Complicated malware infections and cross-site scripting attacks are great techniques to compromise a company, but why use them when you can whisper in someone’s ear instead? Some of the most successful attacks involve nothing more than a phone, some self-confidence, and…