Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

SOAR’s myopic focus may be its undoing

By Gunter Ollmann, CSO, Cloud and AI Security Division, Microsoft Practically every CISO I speak with ranks the difficulty in getting multiple vendors “best of breed” security products working together and returning any measurable ROI as a constant entry in their Top-5 daily gripes. As access to experienced security professionals become scarcer and more expensive,…

Automated Analysis: Answering the call for improved security in connected devices

By Brian Russell, advisor, VDOO The line between physical and digital has blurred. Cyberattacks against digital assets have an effect on the physical world and increase risk exposure for both manufacturers and implementers. Security incidents such as the VPNFilter attack on the only Ukrainian chlorine plant for water treatment or the discovered vulnerabilities on police…

Data Breaches Caused by Misconfigured Servers

Misconfigured server infrastructure is often considered one of the most significant causes of data breaches within the IT industry. This human error phenomenon is usually unintentional, but it can have catastrophic consequences regarding the exposure of sensitive personal information as well as potentially damaging the reputation of your business. Data breaches have gathered a lot…

Cryptojacking: Defending against the latest pernicious cyberthreat

By David Cramer, President of Digital Service Operations (DSO) at BMC Mining for digital currency can be a profitable business, but it requires a lot of computing power. That’s why criminal hackers have been breaking into corporate networks and hijacking servers to run cryptomining software. Enterprises need to defend themselves against this pernicious new threat,…

Management of “Fake News” on Social Media Will Continue On Its Downward Spiral

By Brian NeSmith, CEO and co-founder of Arctic Wolf Networks Over half of the population claims to regularly see fake news on sites such as Facebook or Twitter. Yet, despite fake news being more commonplace than one would think, social media companies have been highly ineffective in doing anything — except around the most egregious…

Bots Are an Existential Threat to Our Economy

By Tiffany Olson Kleemann, CEO, Distil Networks In 1998, “Titanic” became the first movie to gross $1 billion, the Michael Jordan-led Chicago Bulls won their sixth NBA championship, and President Bill Clinton was impeached but acquitted of wrongdoing in the Monica Lewinsky scandal. It also was the year when bots – pieces of software that run automated tasks over…

Six Cybersecurity Predictions for 2019

By Tim Steinkopf, president, Centrify Predictions are, well, predictably unreliable. But one certainty is that cyber breaches will continue to plague organizations in 2019. Here are six emerging trends that can help organizations stay strong in the coming year and build up their cyber defenses. #1: Zero Trust Goes from Buzzword to Reality As catastrophic data…

How to deploy cyber hygiene to prevent ransomware attacks

Timur Kovalev, chief technology officer, Untangle Cyberattacks are becoming more and more common, and in many cases, they can be avoided by training employees and engaging in good IT hygiene practices. Poor IT hygiene can put organizations at unnecessary risk of falling victim to these growing and increasingly sophisticated threats. SMBs, in particular, are susceptible…

Next post in Opinions