Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

The key to protecting against internet traffic hijacking

Recently, reports emerged that a large Asian telecommunications company has been covertly hijacking global internet traffic for nearly 30 months. By publishing false routing information using a protocol called BGP, sources were able to redirect global traffic and pass it through unauthorized locations where it is subject to possible interception and tampering — all without…

How to protect yourself through the hazards of the M&A process

By Kelly White, CEO of RiskRecon Mergers and acquisitions are difficult. It’s an exercise in valuation—and determining the assets and liabilities of the acquisition target is a massive undertaking. Amid the frenzy of deadline-driven, confidential due diligence, things get overlooked: no process is perfect, and usually the overlooked elements are simply the price of doing…

2019 has security execs crying uncle

By

By Jon Check, senior director, cyber protection solutions at Raytheon Intelligence, Information and Services From the halls of government to C-Suites around the world, CISOs and security practitioners alike are “crying uncle” from the onslaught of security tools being pitched to them each day. From the halls of government to C-Suites around the world, CISOs…

User-Friendly Security Solutions Simplify Protection of Enterprise Email Communications

By

By Jason Soroko, CTO of IoT, Sectigo According to the FBI, business email compromise (BEC) attacks have resulted in $12 billion in losses since 2013, and global exposed losses increased 136 percent between December 2016 and May 2018, making it imperative for enterprises to protect employees from phishing scams. Posing as legitimate employees, servers, or…

Measuring cyber risk

By Ryan Stolte, co-founder and CTO, Bay Dynamics How do you measure risk? This is the reigning million-dollar question in infosec. We don’t have a clearcut answer to this question and that can make deciding what actions to take to improve the security of the organization a real challenge for many teams. We are, as…

SOAR’s myopic focus may be its undoing

By Gunter Ollmann, CSO, Cloud and AI Security Division, Microsoft Practically every CISO I speak with ranks the difficulty in getting multiple vendors “best of breed” security products working together and returning any measurable ROI as a constant entry in their Top-5 daily gripes. As access to experienced security professionals become scarcer and more expensive,…

Automated Analysis: Answering the call for improved security in connected devices

By Brian Russell, advisor, VDOO The line between physical and digital has blurred. Cyberattacks against digital assets have an effect on the physical world and increase risk exposure for both manufacturers and implementers. Security incidents such as the VPNFilter attack on the only Ukrainian chlorine plant for water treatment or the discovered vulnerabilities on police…

Next post in Opinions