Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

Why network segmentation is ready for an overhaul

The past five years have seen the overhaul of some of cybersecurity’s biggest technology categories. Palo Alto Networks and the next-generation firewall market upended the network security market, companies like Splunk turned SIEM on its head, and next-generation endpoint technology from companies like Crowdstrike and Cylance changed the game for endpoint security. As these transformations…

Why weakening COPPA could put children at risk online

Privacy fines have been rolling in by the millions this year and one of the more high-profile fines is the 170 million dollar fine imposed by the FTC for Google violating the Children’s Online Privacy Protection Act (COPPA). This is following a current trend of the FTC fining tech companies for not protecting children’s privacy.…

The cloud security capers

Today I am going to share three, semi-fictional cloud adoption horror stories that will make you rethink your current cloud strategies. The False Choice A biometrics security and identity solutions provider sought to establish itself as the premium global brand in the physical security industry. To achieve this goal, company leaders knew they had to…

Selecting a managed security service

Increasingly complex IT infrastructures, higher cloud adoption rates, and a myriad of endpoints resulting from an onslaught of connected devices and sensors are driving the need for managed security services. In fact, a recent IDC report indicated managed security services will be the largest technology category in 2019, with firms spending more than $21 billion…

Application isolation and virtualization provide a false sense of cybersecurity – It’s time for a better solution

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…

Cyber awareness starts with vulnerability awareness

This month marks the fifteenth anniversary of National Cybersecurity Awareness Month. While NCSAM originated as a campaign by the U.S. Department of Homeland Security and the National Cyber Security Alliance to help educate and keep consumers safe online, it has evolved into something much bigger. It’s incumbent on everyone – individuals and organizations of all…

Controlling PowerShell with zero trust microsegmentation

PowerShell is a highly customizable command-line tool that’s often enabled by default. With it, administrators can easily and quickly automate routine tasks necessary for managing day-to-day processes and operating systems. PowerShell provides easy access to data stores, such as the certificate and registry stores, and it comes with a fully developed scripting language. It connects…

Cyber defense is a team sport — Train accordingly

No one would knowingly fly with a pilot that’s never practiced an emergency landing, yet the equivalent scenario is the norm in Security Operations Centers (SOCs) worldwide. Widespread access to cyber ranges – the cybersecurity version of a flight simulator – is helping to change that by enabling incident responders to practice dealing with cyber…

Next post in Executive Insight