IT Security Opinions | SC Media

Opinion

Selecting a managed security service

Increasingly complex IT infrastructures, higher cloud adoption rates, and a myriad of endpoints resulting from an onslaught of connected devices and sensors are driving the need for managed security services. In fact, a recent IDC report indicated managed security services will be the largest technology category in 2019, with firms spending more than $21 billion…

Application isolation and virtualization provide a false sense of cybersecurity – It’s time for a better solution

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…

Cyber awareness starts with vulnerability awareness

This month marks the fifteenth anniversary of National Cybersecurity Awareness Month. While NCSAM originated as a campaign by the U.S. Department of Homeland Security and the National Cyber Security Alliance to help educate and keep consumers safe online, it has evolved into something much bigger. It’s incumbent on everyone – individuals and organizations of all…

Controlling PowerShell with zero trust microsegmentation

PowerShell is a highly customizable command-line tool that’s often enabled by default. With it, administrators can easily and quickly automate routine tasks necessary for managing day-to-day processes and operating systems. PowerShell provides easy access to data stores, such as the certificate and registry stores, and it comes with a fully developed scripting language. It connects…

Cyber defense is a team sport — Train accordingly

No one would knowingly fly with a pilot that’s never practiced an emergency landing, yet the equivalent scenario is the norm in Security Operations Centers (SOCs) worldwide. Widespread access to cyber ranges – the cybersecurity version of a flight simulator – is helping to change that by enabling incident responders to practice dealing with cyber…

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5 million jobs left unfilled, according to Cybersecurity Ventures, in the cybersecurity profession by 2021. The month of October is National Cybersecurity Awareness Month, which aims to raise awareness about the importance of…

Tools don’t hunt threats, people do

Threat hunting is a human-led, machine-assisted initiative, where hunters look at datasets and patterns to determine whether there’s malicious activity or an active adversary in the network. As companies try to stay ahead of the latest, ever-evolving threats, it’s a practice that has become increasingly important to help monitor and manage what’s happening on the…

Evolve security automation like the human brain: Part 2

What’s in a Brain? In my previous blog [CS(1] , I explored how we should approach automation using the Triune Model of the human brain. I broke down how many view our metaphorical brain in three key functional parts: the lizard, the dog, and the primate. I explained how each of those areas function and how…

Evolve security automation like the human brain: Part 1

As our businesses become more digital, there are certain patterns we can borrow from our own evolution to better model and improve our approach to security and efficiency. There’s only so much that the security professionals can do on their own as businesses grow more complex. To maintain a strong security posture, you need to…

Deepfakes and their potential impact on society

Although deepfakes have only been around for a few years, they are quickly becoming a key element in a new era of digital threats. While some teeter on the more comical side – think Will Smith turned into Cardi B on The Tonight Show – others are creating disillusionment and propelling the era of fake…

Next post in Executive Insight