IT Security Opinions | SC Media Opinion

Opinion

Marrying VDI and security: Choose the right tools, not more tools

Virtualization has long been perceived as the holy grail of business agility, simplified management, return on investment, and even security. While the benefits of virtual desktop infrastructure (VDI) are undeniable, the security aspect is, unfortunately, a myth. The security aspect of VDI is not only misunderstood, it is also often perceived as a drag on…

Failure to secure IoT networks has far-reaching consequences, and transportation is a bullseye target

In 2017, millions of moviegoers flocked to theaters for the eighth Fast and Furious movie, where they watched a villainous Charlize Theron take control of hundreds of self-driving cars. Whether they knew it or not, this was many viewers’ first exposure to the idea of a transportation-based cyberattack. And while this specific scenario is not…

Cybersecurity’s top line: Enabling revenue growth and market expansion

Today, most companies know cybersecurity diligence is an essential part of doing business. Yet, it may still be a bit of a surprise how extensively cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion. From contracts and financing to mergers and acquisitions, an organization’s information security…

As threats dramatically increase, critical infrastructure cybersecurity training must evolve

The North American Electric Reliability Corporation (NERC) recently posted a document confirming a cyber event that occurred on a western U.S. electrical grid in spring 2019, marking the first cyberattack on an American grid and, more importantly, striking a chord among operators. The case, which is ironically labeled a “lesson” by NERC, is a glaring…

Cloud Infrastructure IAM Lessons from the Capital One Breach

Cloud infrastructure is the foundation of more companies than ever. As with any foundation, any crack can lead to significant damage to the infrastructure. One potential crack is a trusted identity with unnecessary and excessive privileges. A “trusted identity” is invariably associated with people — employees, contractors or other insiders. But identity in the cloud…

Accelerate your business without compromising security – API security best practices

APIs are a strategic necessity to give your business the agility, innovation and speed needed to succeed in today’s business environment. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With the rise of APIs also comes the potential…

Risk and compliance challenges in the swift moving lead-generation market

Recently, Andrew Smith, Director of the FTC’s Bureau of Consumer Protection stated that one of its priorities would be to “combat bad practices in the lead generation market.” 33 Antitrust ABA 75, 76 (Spring 2019). Smith suggested the FTC was concerned about the entire ecosystem’s bad practices. He echoed his remarks during Comply 2019, an…

Next post in Executive Insight