Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

PCI’s Data Security Standards at a Glance

Step by step, the payment card industry – data security standard requirements have sought to eliminate breaches and theft. Many of these requirements are easy to implement or utilize basic encryption practices that are standard in online transactions. Companies that protect credit card data benefit from years of best practices, but the landscape in cybersecurity…

Cybersecurity needs to learn from algorithmic trading

IT security teams are under more pressure than ever before. Criminals, hackers, competitors, users, business partners, regulators and the changing face of IT are individually and collectively creating pressure points. Some are directly attacking IT systems. Some are acting as an enabler both wittingly and unwittingly. Meanwhile government and regulators are placing additional requirements on…

Ross Rustici

The North Korean sideshow and why the missile escalation cycle should not be the main concern of Western cybersecurity experts

The Democratic People’s Republic of Korea’s (DPRK) cyber activity has often been talked about in terms of radical actions and Bond-style plots. However, their activity appears to be driven by three rational motives: spying, attacking, and racketeering.  Spying: Traditional espionage takes place on a regular basis, although hardly ever talked about. Earlier this year, the…

Cyber Talk: What You Don’t Know Will Hurt You

It’s not easy for an organization to defend against the frequency, sophistication and wide range of attackers seeking to compromise a network, obtain intellectual property or bring business operations to a halt.  And all too often, we see executive teams resort to buying a broad range of solutions as the answer to growing cyber threats,…

Walling In Your Garden in Today’s New World of Cyberattacks

Gardener’s Question Time is a popular BBC radio program which, in addressing such pressing topics as powdery mildew on honeysuckle, takes its listeners back to the halcyon days that Rupert Brooke, on the cusp of the Great War and “sweating, sick and hot” in Berlin, evokes so perfectly in his poem The Old Vicarage, Grantchester:  “Stands…

Three Signs that Privacy is Evolving Like Security

Fifteen years ago, the idea of data protection was hiring a hacker to test the strength of your network perimeter security. Eventually, that same guy started selling you the tools you needed to protect yourself from hackers like himself. Jump forward to 2017 and the security industry is now a multi-billion dollar market, busting out…

10 ways to improve your employee notification system

Today, many organizations view mass notification systems through the lens of emergency and disaster events, such as evacuations, severe weather, terrorist incidents or active shooter situations when the ability to deliver real-time alerts to employees, customers, partners and consumers is critical. But intelligent mass notification is increasingly becoming a core tool for enterprise CXOs seeking…

The Empire State Lays Down the Marker on Cybersecurity

by Elad Yoran, Executive Chairman of KoolSpan & CEO of Security Growth Partners and Natasha Cohen, Director for Cyber Policy and Client Strategy at BlueteamGlobal The New York Department of Financial Services 23 NYCRR 500 Cybersecurity Requirements for Financial Companies went into effect on March 1st of this year.  While the requirements are New York…

When Phishing Schemes Go South: Too Many Moving Pieces

It’s not easy being a bad guy. Even in an age where a bad guy wanna-be can turn to a bustling black market of tools and services to facilitate criminal activities ranging from banker trojans and ransomware to bot-nets, would be malicious actors still face plenty of challenges. And, yes, those challenges do extend beyond…

Next post in Executive Insight