IT Security Opinions | SC Media Opinion

Opinion

Why automating network security policies is the missing link to digital transformation

Never in the history of business has technology evolved as rapidly as it is now. The speed of conducting business in the digital era has spurred enterprises to adopt hybrid cloud-based systems, micro-segmentation and virtual platforms as crucial elements of enterprise-level digital transformations. But transformations like these require significant resources – not just capital and…

Best practices for reducing third-party risk

The simple truth is that the security measures organizations put in place are not enough to protect them from threats. Third parties can present the greatest area of risk exposure — both for data security and for regulatory compliance. It is much easier for hackers to penetrate smaller third-party vendors to get to larger business…

Application isolation and virtualization provide a false sense of cybersecurity

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…

Get ahead of the cybersecurity curve

Experienced cybersecurity leaders are beginning to call for a move from reactive detection to proactive prevention. It’s clear that the need to get ahead of the cybersecurity curve is real. Over the past decade, experts talked about the number of days that malware is in your system, and now the discussion is fast becoming how…

The psychology of ransomware

While there is some debate over whether the number of ransomware attacks is rising, there is no arguing that the losses suffered by both public and private sector organizations have increased. Hardening your organization’s security posture requires an understanding not only of how ransomware works technically, but also how the attacks psychologically compel victims to…

Solving man in the middle cyberattacks with cloud-native SDPs

When it comes to the workplace, we are office-bound no more. While it still may seem counterintuitive, most work today actually gets done (at least some of the time) from remote locations, not company offices. Whether from home, a co-working space, or an airport, subway, hotel, or Starbucks, employees and contractors alike can be found…

Next post in Executive Insight