Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

AppSec attack and defense: The password domino effect

The discourse around application security makes for a complex discussion. Experts seldom reach agreement in defining the best strategy in the face of the myriad of threats that individuals and organizations face. That said, one truth is held unanimously: There is no “silver bullet.” In other words, no security solution can compensate for the inherent…

Cybersecurity threats and unified communications

Given that businesses and customers are constantly working to become more connected and digital-first, there is a paramount need for them to protect their cyber assets and personal information as a result. Analysts estimate that by 2020, 60 percent of all enterprises will be the victims of a major cybersecurity breach. As reported by Cybersecurity…

The state of endpoint health in 2019

The endpoint has quickly become valuable real estate for security tools and controls, as traditional network perimeters have given way to cloud-based models in support of the digital workforce. By 2020, global IT security spend is expected to reach $128 billion with 24 percent of it allocated to endpoint security tools. In fact, organizations today use an average of 80 security…

What cybersecurity can learn from bananas

Since the 1950s, the Cavendish banana has dominated the world market. Its thick skin makes it easy and stable to transport, and its flavor and seedlessness give it broad appeal. But the Cavendish banana’s lack of seeds is fast becoming its downfall. Without seeds, the Cavendish banana cannot reproduce naturally. It must be cloned. This…

Wargaming cannot take the place of real cyber protection

It’s no big secret: cyberattacks keep business leaders up at night. In a World Economic Forum executive study in November, cyberattacks were rated as the fifth biggest risk to businesses worldwide, one place behind cybercrime and fraud, and the number one business risk in the U.S. In fact, the collective interest regarding the threat of…

No, VPNs Aren’t Dead — They’re More Essential Than Ever

A few weeks ago, a particular SC Media Executive Insight claimed it’s time to say good-bye to VPNs. Among other things, the writer claimed that application access was more effective, and that zero trust architecture is an essential ‘alternate model’ for access. While I agree with Mr. Sullivan that application access and zero trust architecture…

The digital unraveling: Vigilantes, rogue competitors, big break ups, and broken trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed online with ever-decreasing time to fix…

Small businesses beware: Cyberwar is right around the corner

Damages from cybercrime will cost $6 trillion by 2021. It’s a statistic from Cybersecurity Ventures that can’t be ignored and it’s the biggest threat facing businesses today, with reports indicating that more than 50 percent of IT decision makers are flagging phishing attacks as a top security threat. This year alone, ransomware will hit a…

ML innovation and compliance

With machine learning, AI and privacy all becoming priority initiatives for companies, why has the data tug-of-war between IT and developers become such a challenge? The tension between data science teams and IT departments stems in part from cultural differences. Traditionally, data science is rooted in a “hacker,” outside-the-box, experimental culture while IT professionals come…

Next post in Opinion