Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

Part 3 – Cooperative cybersecurity protection for large-scale infrastructure

Cybersecurity analytics for large-scale protection Click here for part 2. Most modern security analytic methods and tools are best suited to larger infrastructure with large data sets. That is, it is unlikely that one would use real-time, telemetry-based monitoring with 24/7 coverage for a personal computer, unless that personal computer was connected to a larger…

Part 2 – Cooperative cybersecurity protection for large-scale infrastructure

Cyberthreats to infrastructure Click HERE for Part One Any cooperative effort that supports large-scale infrastructure protection must begin with an accurate perception of the real cyber risks that must be addressed. Experts understand that risk is measured by combining the probability of bad outcomes with the consequences of such outcomes. In the context of infrastructure…

Why is election security a partisan issue?

Frankly I never thought that securing the elections would be a partisan issue.  But then, why am I surprised?  Anything that touches Washington becomes a partisan issue.  Securing the elections, ensuring ballot machines can’t be hacked, and ensuring voter registration data isn’t altered or deleted should be a common goal for everyone in Washington.    Elections…

Shadow IT: The silent cloud migration killer

As more organizations see the benefits the cloud can offer, enterprises are eager to implement cloud migration strategies. By next year, Gartner forecasts that 75 percent of organizations will take the next step and deploy a multicloud or hybrid cloud model to meet their IT needs. As with any major IT shift, there are several…

Comparing 5G to Wi-Fi 6 from a security perspective

Enterprise-grade Wi-Fi systems have proven to be secure for thousands of demanding customers across virtually all industries. With the recent hype around 5G and service providers promoting 5G as an alternative to Wi-Fi in the enterprise, it pays to understand how 5G security stacks up against Wi-Fi security. Cellular security has improved with each generation.…

How securing DER smart grids differs from securing traditional energy grids, and why it matters

For an industry historically slow to change, the ongoing transformation of the power grid is remarkable. However, with this transformation comes a dramatic increase in the risks of the grid being hacked and disabled. Securing the modern “smart grid” requires new networking technology and services designed to cost-effectively secure communications to assets ranging from utility-scale…

Three reasons why moving target defense needs to be a priority in any cybersecurity ctrategy

The vicious cycle of imbalance between cyber attackers and defenders seems never-ending. Defenders continue to develop and implement new tools to prevent, detect, monitor and remediate cyber threats while attackers simultaneously develop new attack techniques to thwart defenses, which for all intents and purposes gives them the upper hand. But a new concept, originally conceived…

Next post in Executive Insight