IT Security Opinions | SC Media

Opinion

Can your network operator stop your smart washer from airing your dirty laundry?

Migration to 5G and the better connectivity it promises has also brought with it an equally burgeoning cybersecurity threat landscape. This, coupled with the proliferation of IoT devices that are fraught with inherent security flaws, means even bigger security woes for consumers. It is, therefore, no wonder that Americans are more worried about cybercrime than…

Protect your domain and protect your customers: The top three domain-based attack tactics

Today, businesses around the world rely on owned websites and domains to grow brand awareness and promote and sell products and services. With e-commerce and online shopping at an all-time high, securing owned domains and removing malicious or spoofed domains is imperative for protecting modern consumers and their personal information from cybercrime. As cybercriminals often…

IllenaArmstrong

Striving for diversity

To take a barometer of the cybersecurity industry early in our year, we’re looking at a few areas this March. In addition to a general market update and where money is being invested, we’re also looking at what could be the costlier mistakes organizations make when it comes to over-arching cybersecurity strategizing and maintenance. One…

Red and blue teams have changed

The long-held rivalry between red and blue teams has served a beneficial purpose, simulating the highly competitive real-world environment between hackers and those defending organizations. However, recent advances in blue team capabilities and the sophistication of the security technologies that support them have shifted the balance between the two groups. While in years past the…

Shared responsibility evolves

Businesses must embrace the concept of a shared responsibility mode. Nigel Hawthorn Businesses are conflicted about moving their data to the cloud. Some claim that one of the main reasons for moving data to the cloud is because it is more secure. Major cloud vendors like Microsoft, Amazon, and Google correctly point out that the…

Is the CISO a second-class executive?

Why does it appear that the CISO is a second-class executive? Are CISOs the victim of a business that “doesn’t get it”? Or is the business a victim of CISOs that “don’t bring it”? The plight of the CISO is well documented. It can be a challenging and thankless role that is accompanied by high…

Machine learning log analysis platforms – the new wing man to SIEM?

SIEM vendors claim to provide machine learning functionalities in their solutions.  Gartner recently covered the growing arena of Machine Learning Log Analysis, and how it is being positioned as a complement to SIEM.  What do CISOs and security directors need to look for to effectively navigate ML in their security platform? Machine Learning (ML) is…

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5 million jobs left unfilled in the cybersecurity profession by 2021. The month of October is National Cybersecurity Awareness Month, which aims to raise awareness about the importance of cybersecurity, and additionally, draw…

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…

Protect your data assets – Building a secure NAS from the ground up

How long could your enterprise operate without access to vital data assets and customer information? Odds are, not very long. Data is the oxygen of the modern enterprise, and access to files and data is critical for business operations. The scourge of ransomware attacks across a wide range of industries (healthcare, industrial, government, etc.) and…

Next post in Executive Insight