Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

When spreadsheets are enough for risk management

Third-party vendors are crucial to a company’s success, but they inherently create risk and require monitoring to ensure their vulnerabilities don’t develop into a bigger problem like a data breach. Responsible companies monitor their third-party risk, and many do it with a combination of manually-updated spreadsheets. Are spreadsheets enough to manage vendor risk? Smaller operations…

IllenaArmstrong

Ransomware grows more lucrative

At a fairly recent conference for financial institutions that was offering open, candid discussions and interactive training for cybersecurity leaders in attendance, ransomware was THE hot topic. In fact, this rising attack-type merited a half day of training that involved numerous three-letter agencies. The reasons for this are simple. As SC Media journalists this month…

Ransomware: Fast and furious

Ransomware is by far and away the fastest growing attack method in cybercrime. It’s a trend that has only continued in 2019, with a serious uptick in the number of ransomware incidents and insurance claims in just the last couple of months. As the volume and efficacy of attacks continue on an upward trajectory, another…

Maintaining data security while processing data in the cloud

The scalability, flexibility, easy access, and cost savings of the cloud have made it easier than ever for organizations to store, access, and analyze their customer data. However, regulations like the General Data Protection Regulation (GDPR) place significant demands around how and where data can be accessed and used. Consequently, global organizations that are processing…

Can automation solve your patching problems?

With complex systems and the pressure of keeping everything up to date, patch management consistently presents a challenge for IT-Ops and infrastructure teams, even those that have a traditional patching solution in place. For some systems, it can take months to install critical patches, leaving open vulnerabilities that put organizations at risk. So, why is…

In cybersecurity speed kills, but faster saves

The 2019 Verizon Data Breach Investigations Report (DBIR) came out not long ago. There are a lot of incremental change in the 78 pages of charts and graphs, which is normal for a report of this kind. The DBIR isn’t rocking anyone’s boat with blockbuster findings; instead, it reveals trends that may or may not be comforting.…

Making the case for IT/OT security integration

In the security world, operational technology (OT) has long been “the land of the forgotten,” taking a backseat in priority to IT network security. This is no longer tolerable, as adversaries and malicious actors increasingly target OT systems in attempts to extort enterprises or simply wreak havoc through equipment damage, environmental harm or loss of…

Next post in Executive Insight