Cybersecurity Executive Insight, opinions and analysis l SC Media Executive Insight

Executive Insight

Application isolation and virtualization provide a false sense of cybersecurity

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…

Get ahead of the cybersecurity curve

Experienced cybersecurity leaders are beginning to call for a move from reactive detection to proactive prevention. It’s clear that the need to get ahead of the cybersecurity curve is real. Over the past decade, experts talked about the number of days that malware is in your system, and now the discussion is fast becoming how…

The psychology of ransomware

While there is some debate over whether the number of ransomware attacks is rising, there is no arguing that the losses suffered by both public and private sector organizations have increased. Hardening your organization’s security posture requires an understanding not only of how ransomware works technically, but also how the attacks psychologically compel victims to…

Solving man in the middle cyberattacks with cloud-native SDPs

When it comes to the workplace, we are office-bound no more. While it still may seem counterintuitive, most work today actually gets done (at least some of the time) from remote locations, not company offices. Whether from home, a co-working space, or an airport, subway, hotel, or Starbucks, employees and contractors alike can be found…

Leading people in the times of digital transformation

The work world continues its metamorphosis as organizations increasingly leverage technology to modernize their business strategies. As the pace of change intensifies, many companies just cannot compete as competition rains in from every direction. “Digital platforms now deliver immense value, enabling us to connect, collaborate and broaden our minds – raising awareness about important issues,…

Containing the ripple effect of cloud cyberattacks

The internet continues to grow more interwoven, interdependent and fragile, with power increasingly concentrated in a handful of big cloud players. When a cyberattack brings down one of them, there is often extensive collateral damage to the thousands of enterprises relying on its service. Case in point: in late October Amazon’s Route 53 DNS server…

Next post in Executive Insight