Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

5 Steps organizations should take to ensure CCPA compliance

Now that the California Consumer Privacy Act has officially taken effect, follow these 5 steps to ensure compliance, even if your organization is outside the Golden State. According to the Identity Theft Resource Center, more than 164 million consumer records containing personally identifiable information (PII) were exposed in data breaches in 2019. Seemingly every week…

How security can enable business continuity by protecting newly remote employees

The shelter-in-place orders and closure of non-essential businesses that have been implemented to slow the spread of COVID-19 have brought the need for business continuity to the forefront. Most enterprises have shifted to a work-from-home model that allows employees to continue working while adhering to social distancing measures. However, the massive shift to remote work…

Achieving “security in sunshine” through a security champions program

In today’s world, every business can be thought of as a software business, comprising hundreds of thousands of applications. However, every application holds an average of 26.8 serious vulnerabilities  — a number indicative of today’s modern security landscape where web application attacks remain the leading cause of large breaches by a very wide margin. Hackers…

Bigger budgets have not entailed more security

Greater spending on cybersecurity products hasn’t entailed a better organizational security posture. Despite the millions of dollars spent by organizations year on year, the average cost of a cyberattack jumped by 50 percent between 2018 to 2019, hitting $4.6 million per incident. Labor intensive security solutions like signature-based heuristics, machine learning and threat hunting all…

Using an SDP client to create a secure, hyperconnected smart city

Cities are the centerpiece for the vast majority of the world’s data production and energy consumption. According to the United Nations, more than half (55 percent) of the global population currently resides in urban areas, and that number is projected to rise to nearly 70 percent over the next three decades. It’s predicted that in…

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…

IllenaArmstrong

The staying power in resiliency

The concept of resiliency – whether we’re talking cybersecurity strategies, job markets or individuals – is particularly resonant these days. True, the resiliency of whole nations and their citizens has been tested in the past. During the years of World War II, our great grandparents and maybe even some of our parents saw days of…

Maintaining resiliency in a newly remote age

The rapid, global shift to remote work, along with surges in online learning, gaming, and video streaming, is generating record-level internet traffic and congestion. Organizations must deliver consistent connectivity and performance to ensure systems and applications remain functional, and business moves forward, during this challenging time. System resilience has never been more critical to success,…

Next post in Executive Insight