IT Security Opinions | SC Media

Opinion

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say they’ve experienced…

How to build privacy for security and achieve sustained compliance

By Paul Iagnocco, director, consulting ,TrustArc Global and domestic privacy regulations like GDPR and the California Consumer Privacy Act (CCPA) are forcing businesses to develop and implement comprehensive data management processes to comply with new privacy requirements. In this age of compliance, privacy strategies have become ongoing initiatives, rather than one-time implementations. New privacy-by-design principles…

The key to protecting against internet traffic hijacking

Recently, reports emerged that a large Asian telecommunications company has been covertly hijacking global internet traffic for nearly 30 months. By publishing false routing information using a protocol called BGP, sources were able to redirect global traffic and pass it through unauthorized locations where it is subject to possible interception and tampering — all without…

How to protect yourself through the hazards of the M&A process

By Kelly White, CEO of RiskRecon Mergers and acquisitions are difficult. It’s an exercise in valuation—and determining the assets and liabilities of the acquisition target is a massive undertaking. Amid the frenzy of deadline-driven, confidential due diligence, things get overlooked: no process is perfect, and usually the overlooked elements are simply the price of doing…

2019 has security execs crying uncle

By

By Jon Check, senior director, cyber protection solutions at Raytheon Intelligence, Information and Services From the halls of government to C-Suites around the world, CISOs and security practitioners alike are “crying uncle” from the onslaught of security tools being pitched to them each day. From the halls of government to C-Suites around the world, CISOs…

User-Friendly Security Solutions Simplify Protection of Enterprise Email Communications

By

By Jason Soroko, CTO of IoT, Sectigo According to the FBI, business email compromise (BEC) attacks have resulted in $12 billion in losses since 2013, and global exposed losses increased 136 percent between December 2016 and May 2018, making it imperative for enterprises to protect employees from phishing scams. Posing as legitimate employees, servers, or…

Measuring cyber risk

By Ryan Stolte, co-founder and CTO, Bay Dynamics How do you measure risk? This is the reigning million-dollar question in infosec. We don’t have a clearcut answer to this question and that can make deciding what actions to take to improve the security of the organization a real challenge for many teams. We are, as…

IllenaArmstrong

Cybercrime pays…on both sides

By

Cybercrime, apparently, does pay. This is according to a few of the articles in this edition as well as many other news and feature reports we’ve done in the past based on any number of research papers that have sprung up over the last 12 to 18 months. Illena Armstrong, VP, editorial of SC Magazine.…

A steady stream of phishy emails

By

Phishing scams have the ability to swoop up valuable information with one deceptive email, so it makes sense they have been a popular methodology for cybercriminals for a while. And it’s likely to remain that way, at least for the time being. Scott Gerlach is chief information security officer at SendGrid. 2018 proved that phishing…

Next post in Opinion