Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

The inside scoop on insider threats

Cybercriminals continue to develop new attack methods that pose a serious risk to enterprise security, but they are not the only threats enterprises need to defend against. Employees – whether well-meaning but careless or those with malicious intentions, pose a great risk. In fact, insider threats are among the leading causes of data breaches. Verizon’s…

IoT proliferation and widespread 5G: A perfect botnet storm

By now, we’ve heard the many promises of the 5G era. Organizations across industries are poised to take advantage of the enhancements 5G will bring to boost their products and services in ways that were difficult or expensive to achieve using 4G networks. The Internet of Things (IoT) is a big part of this shift,…

2020 Vision: Cybersecurity through a business lens

Over the coming years organizations will experience growing disruption as threats from the digital world have an impact on the physical. Invasive technologies will be adopted across both industry and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach to security and increased resilience will be crucial as…

Working From Home in the Age of COVID-19

All of us have seen or issued guidance that looks something like this: “We are committed to doing our part to stem the spread of the COVID-19 virus. Consistent with guidance from the World Health Organization, the U.S. Centers for Disease Control and Prevention, and other national and local health authorities regarding efforts to limit…

COVID-19 puts corporate WFH capabilities to the test

While many organizations already have telecommute policies and solutions in place, they are most commonly for either fully-remote workers or for employees who typically work in the office but need flexibility for unusual situations. The current environment most companies now face may put their remote workplace capabilities to the test. This is most pronounced when…

Five tips for managing remote workers during a pandemic

Is your organization ready to securely support a wide range of remote workers in the wake of a global pandemic? With cases of coronavirus mounting in countries around the globe and the Centers for Disease Control (CDC) warning citizens to be prepared for the likelihood the illness will spread across other regions of the world,…

Secure Access Service Edge (SASE) – key points for early adopters

Last year Gartner introduced the term Secure Access Service Edge or SASE in their technology hype cycle and almost immediately it grabbed enormous attention from the vendors and enterprise consumers. Existing and new technology players already started highlighting the benefits of SASE and marketing their offering to attract customers. But what is this SASE? Why…

Five non-phishing types of cyberattacks to prepare for

Everybody is talking about email, browsing, and phishing as the main attack scenarios organizations should care about. However, in the real world, determined attackers use a variety of additional techniques that are in many cases under the radar of enterprise security teams. There are many of those attacks out there, and they’re gaining popularity. Here…

Next post in Executive Insight