Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

The role of the CISO during a cyber crisis

By: Stephen Moore The role of a chief information security officer (CISO) can never be miscategorized as low-stress. As cyberthreats become more incessant and malicious, a CISO’s job is increasingly difficult, and the challenge of safeguarding corporate, customer and employee data along with intellectual property becomes even more challenging. The person hired for this position…

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say they’ve experienced…

How to build privacy for security and achieve sustained compliance

By Paul Iagnocco, director, consulting ,TrustArc Global and domestic privacy regulations like GDPR and the California Consumer Privacy Act (CCPA) are forcing businesses to develop and implement comprehensive data management processes to comply with new privacy requirements. In this age of compliance, privacy strategies have become ongoing initiatives, rather than one-time implementations. New privacy-by-design principles…

The key to protecting against internet traffic hijacking

Recently, reports emerged that a large Asian telecommunications company has been covertly hijacking global internet traffic for nearly 30 months. By publishing false routing information using a protocol called BGP, sources were able to redirect global traffic and pass it through unauthorized locations where it is subject to possible interception and tampering — all without…

How to protect yourself through the hazards of the M&A process

By Kelly White, CEO of RiskRecon Mergers and acquisitions are difficult. It’s an exercise in valuation—and determining the assets and liabilities of the acquisition target is a massive undertaking. Amid the frenzy of deadline-driven, confidential due diligence, things get overlooked: no process is perfect, and usually the overlooked elements are simply the price of doing…

2019 has security execs crying uncle

By Jon Check, senior director, cyber protection solutions at Raytheon Intelligence, Information and Services From the halls of government to C-Suites around the world, CISOs and security practitioners alike are “crying uncle” from the onslaught of security tools being pitched to them each day. From the halls of government to C-Suites around the world, CISOs…

User-Friendly Security Solutions Simplify Protection of Enterprise Email Communications

By Jason Soroko, CTO of IoT, Sectigo According to the FBI, business email compromise (BEC) attacks have resulted in $12 billion in losses since 2013, and global exposed losses increased 136 percent between December 2016 and May 2018, making it imperative for enterprises to protect employees from phishing scams. Posing as legitimate employees, servers, or…

Measuring cyber risk

By Ryan Stolte, co-founder and CTO, Bay Dynamics How do you measure risk? This is the reigning million-dollar question in infosec. We don’t have a clearcut answer to this question and that can make deciding what actions to take to improve the security of the organization a real challenge for many teams. We are, as…

Next post in Opinion