Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

How to engage continuous oversight in the cloud

New and emerging technologies, such as AI, edge computing and IoT devices are all linked in some ways to cloud computing services. The rise of cloud computing has created new challenges for information assurance professionals. With third-party outsourced services, often through cloud connections, being increasingly leveraged and the expanding use of employee-owned computing devices (BYOD),…

What’s in your cloud?

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments. The attack…

Bad bid: Malicious actors target government contractors

IT personnel working the trenches in the fight against malicious emails know that financial transactions — and the various documents that support and accompany those transactions — provide malicious actors seemingly endless fodder for clever phishing attacks designed to separate legitimate organizations from their money and reputations, as well as their customers, clients, and partners.…

What you don’t, but need to, know about AI

These days, any mention of cybersecurity solutions will inevitably lead to a conversation involving artificial intelligence (AI). That’s because the marketing of many next-generation cybersecurity tools and solutions places AI front and center as the main line of defense. This growing attention to AI is certainly affecting cybersecurity decision-makers—71% of businesses plan on investing in…

The zero trust model explained

Zero Trust is more than a buzzword or a single product. Instead, it is a recognition that how we work has fundamentally changed and that we need to shift the way that we think about working securely. At its core, Zero Trust marks a move away from the binary security model that focuses on keeping…

How artificial intelligence is enhancing enterprise security

With more devices being introduced to the corporate network, enterprises are facing an onslaught of cyber security challenges as constant threats are becoming much more sophisticated and prevalent. The prospect of data breaches, loss of sensitive data, or network crashes forces corporations to implement security measures and build cyber security strategies to protect digital assets…

Next post in Executive Insight