Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

Build a data-driven defense strategy to fight cybercrime

The coronavirus pandemic is being compared to war-like conditions by the World Health Organization. We know that bad decisions and poor data (or intelligence) during a war can have serious human and economic consequences. Compare Italy, Spain and the US to Singapore, Taiwan and Hong Kong. Even though the enemy is the same, some nations…

The quick and the breached: Futureproofing security operations

Security is about rates: the adversary is innovative, motivated, funded and enjoys the advantages of asymmetry in cyber conflict. The rate of improvement in the proficiency of attackers is increasing faster than, by-and-large, that of the defenders. The first step to being futureproofed is to be present-proofed; and the essence of that is to be…

More CFOs feeling the heat with ransomware

 Too often we’re hearing about ​cities​ and ​organizations​ falling prey to ransomware attacks with the average cost of ransomware related downtime ​hovering around $55K​ – note that’s just the cost of ​downtime ​ , which excludes any ransom that might be paid. It’s also estimated that the total damage costs from global ransomware incidents are…

The Top 5 most common vulnerability remediation mistakes

For enterprise IT Teams, software vulnerabilities are an unavoidable fact of life. New ones are found all the time and older ones are still being exploited. It’s a “drinking-from-the-firehose” situation that can no longer be ignored. As we work with companies to refresh their vulnerability management programs, here are five common mistakes we see security…

A 10-point plan for securing remote workers

Globally, more and more organizations are beginning to enforce work from home policies for employees and contractors. Opening up this kind of remote access for employees and contractors across all departments is new for many organizations. While several organizations have remote access for their IT support personnel, allowing access for all major departments, including core…

Breaking out of password Groundhog Day

In the classic comedy “Groundhog Day,”  weatherman Phil Connors, played by Bill Murray, must repeat the same day of his life over and over again until he finally changes his ways. It feels uncomfortably close to home to watch Murray’s character repeat the same routine, and make the same mistakes, until he finally takes a…

Why the information security of your company depends on machine learning

Machine learning operations (MLOps) technology and practices enable IT teams to deploy, monitor, manage, and govern machine learning projects in production. Much like DevOps for software, MLOps provides the tools you need to maintain dynamic machine learning-driven applications. The security of your future enterprise depends on the decisions you make today related to these new…

Best practices for implementing a DLP solution

Traditional defenses are no match for targeted attacks that bypass security controls and steal sensitive data. As IT changes continue to occur, organizations need to be more strategic to combat modern threats. They must shift their focus from attempting to secure everything, to protecting what matters most—the data itself. No matter where it is stored,…

Putting zero trust into action

If awards were given for “Security Phrase of the Year”, surely zero trust would win the top prizes for 2019. The term graced the headlines of countless cyber industry articles, blogs, case studies and PowerPoint presentations, all created by organizations hoping to harness the power of this construct. The excitement is understandable, because it sure…

The inside scoop on insider threats

Cybercriminals continue to develop new attack methods that pose a serious risk to enterprise security, but they are not the only threats enterprises need to defend against. Employees – whether well-meaning but careless or those with malicious intentions, pose a great risk. In fact, insider threats are among the leading causes of data breaches. Verizon’s…

Next post in Executive Insight