IT Security Opinions | SC Media

Opinion

Key pillars of the modern SOC

Security Operation Centers (SOCs) are struggling to meet the demands of the evolving threat landscape. Today, most analysts only have access to a portion of their companies’ data due to the high cost of analysis and storage. Workflows are still rules-based or manual, leading to a reactive approach to threat intelligence instead of a proactive,…

Lessons Learned: What Uber’s Approach to Decentralization Can Teach the Cybersecurity Industry

Notorious Uber founder Travis Kalanick’s idea for a decentralized transportation system in which any person with a valid license, no criminal history and proof of insurance could generate income as an on-demand driver has disrupted the transportation industry in ways few could have ever imagined. While the reality of Kalanick’s vision has in fact devastated…

5 Things You Need to Know About API Protection

Whether you realize it or not, APIs are everywhere in your organization and they’re growing in numbers. In fact it’s estimated that the average organization manages over 300 APIs, many of which are exposed externally to customers and partners. While the concept of APIs may still be foreign to some, they’re an integral part of…

Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography

As cyberattacks grow in number and sophistication, it is essential that data is protected. But in today’s evolving threat landscape, this is not as simple as applying traditional security to communications systems. Indeed, many current systems use protocols based on mathematical problems, such as integer factorization, which could be easily cracked by quantum computers of…

The automation quandary: Or how to stop worrying and start automating

Information security is threatened from multiple angles. Threats have grown more sophisticated, digital infrastructures more complex, data more voluminous, and security talent increasingly scarce. The pace and volume make it impossible for IT groups to keep up. Automating tasks is an obvious solution to these challenges, but there are deeply ingrained concerns that automation will…

The Need for Trust amidst the “Zero Trust” Movement

My entrance into the world of technology and cybersecurity coincidentally occurred in simultaneous fashion with what Symantec has coined the Big Boom age[1] of data breach. It was March 2005 that the world witnessed the first data breach to include over one million compromised records at DSW Shoe Warehouse. Since then and as of today,…

Three lessons from the top cybersecurity threats of 2018

The pace of cybersecurity threats was unrelenting last year, as cyber criminals continuously introduced new attacks and tried new tactics for outsmarting potential victims. A look back at the most prevalent threats that the Barracuda Research team studied over the course of the year reveals three important lessons that organizations and their IT service providers…

The trickle-down effect of cyberwarfare: Protecting yourself when the bad gets worse

In the post-Vault7 world, there has been an interesting shift in the cybersecurity landscape. At one time, well-funded, government-backed nation-state threat actors were the only ones capable of carrying out sophisticated cyberattacks. But now, these hacking techniques have trickled down to your average cybercriminal, equipping them with the power to take down enterprise networks, steal…

Next post in Executive Insight