Cybersecurity Executive Insight, opinions and analysis l SC Media Executive Insight

Executive Insight

Why weakening COPPA could put children at risk online

Privacy fines have been rolling in by the millions this year and one of the more high-profile fines is the 170 million dollar fine imposed by the FTC for Google violating the Children’s Online Privacy Protection Act (COPPA). This is following a current trend of the FTC fining tech companies for not protecting children’s privacy.…

The cloud security capers

Today I am going to share three, semi-fictional cloud adoption horror stories that will make you rethink your current cloud strategies. The False Choice A biometrics security and identity solutions provider sought to establish itself as the premium global brand in the physical security industry. To achieve this goal, company leaders knew they had to…

Selecting a managed security service

Increasingly complex IT infrastructures, higher cloud adoption rates, and a myriad of endpoints resulting from an onslaught of connected devices and sensors are driving the need for managed security services. In fact, a recent IDC report indicated managed security services will be the largest technology category in 2019, with firms spending more than $21 billion…

Application isolation and virtualization provide a false sense of cybersecurity – It’s time for a better solution

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…

Cyber awareness starts with vulnerability awareness

This month marks the fifteenth anniversary of National Cybersecurity Awareness Month. While NCSAM originated as a campaign by the U.S. Department of Homeland Security and the National Cyber Security Alliance to help educate and keep consumers safe online, it has evolved into something much bigger. It’s incumbent on everyone – individuals and organizations of all…

Controlling PowerShell with zero trust microsegmentation

PowerShell is a highly customizable command-line tool that’s often enabled by default. With it, administrators can easily and quickly automate routine tasks necessary for managing day-to-day processes and operating systems. PowerShell provides easy access to data stores, such as the certificate and registry stores, and it comes with a fully developed scripting language. It connects…

Cyber defense is a team sport — Train accordingly

No one would knowingly fly with a pilot that’s never practiced an emergency landing, yet the equivalent scenario is the norm in Security Operations Centers (SOCs) worldwide. Widespread access to cyber ranges – the cybersecurity version of a flight simulator – is helping to change that by enabling incident responders to practice dealing with cyber…

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5 million jobs left unfilled, according to Cybersecurity Ventures, in the cybersecurity profession by 2021. The month of October is National Cybersecurity Awareness Month, which aims to raise awareness about the importance of…

Tools don’t hunt threats, people do

Threat hunting is a human-led, machine-assisted initiative, where hunters look at datasets and patterns to determine whether there’s malicious activity or an active adversary in the network. As companies try to stay ahead of the latest, ever-evolving threats, it’s a practice that has become increasingly important to help monitor and manage what’s happening on the…

Next post in Executive Insight