Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

5 Ways Web Attacks Will Change Post-COVID

COVID-19 has accelerated changes in the way attackers hit web applications. Based on behaviors we observed during our research, we developed five predictions on how web application security will change as we come out of the COVID-19 period – and what security pros can do about it. 1. More sophisticated account takeover (ATO) attacks. The…

5 Ways vCISOs Move the Security Needle

Data has become more valuable than ever and organizations must make protecting it a top priority. According to IBM and the Ponemon Institute, the average data breach now costs American companies $8.19 million. On top of that, the recently-released Verizon Data Breach Investigations Report found that 86 percent of all breaches were financially-motivated.  As attacks…

Inside the Dark Web: 4 Misconceptions and How Security Teams Can Change Minds and Benefit

While the dark web offers a haven for criminals and serves as inspiration for Hollywood blockbusters, it’s much more mundane in real life. Still, many businesses feed into the fallacies surrounding the dark side of the Internet, ultimately delaying their ability to protect employees and consumers. Our industry really needs to shed some light on…

Only a Public-Private Partnership Can Secure the Electric Grid

President Trump recently issued an Executive Order to bar the purchase of certain critical electrical grid components from foreign adversaries. This order—like a similar telecommunications order released last year—reflects an acknowledgment by the federal government of a longstanding cyber threat to the electric grid posed by compromised equipment.  As with other threats to our critical…

Deliver More Effective Threat Intelligence with Federated Machine Learning

Cybercriminals never stop innovating. Their increased use of automated and scripted attacks that increase speed and scale makes them more sophisticated and dangerous than ever. And because of the volume, velocity and sophistication of today’s global threat landscape, enterprises must respond in real-time and at machine speeds to effectively counter these aggressive attacks. Machine learning…

XDR: The New Cybersecurity X Factor

By

By correlating threat telemetry across multiple attack surfaces, XDR – Extended Detection and Response – promises to address today’s harsh threat landscape by amplifying the scale, speed, and scope in which security pros can detect and remediate attacks. We call it the X-Factor. Now, XDR automates manually intensive big data investigations, which will help security…

5 Ways Security Can Ensure Business Continuity in the COVID-19 Era

The COVID-19 pandemic has become a wake-up call for companies to sharpen their business continuity plans. As the crisis continues on, many realize the business continuity strategies they have in place aren’t equipped to safeguard against the new and evolving security risks of the remote workforce, or resilient enough to sustain business operations through another…

Next post in Executive Insight