IT Security Opinions | SC Media

Opinion

Double jeopardy: Data center security and the threat of cryptocurrency mining

By Liviu Arsene, senior e-threat analyst, Bitdefender Cybercrime is motivated by financial gain, be it in the form of money or data that can be monetized. Experts estimate the cybercrime industry nets trillions in illicit profits while causing significant financial and reputational damage to organizations. Organizations agree that their security risks have increased in the…

Balancing AI with Human Intelligence in Cybersecurity

By Landon Lewis, CEO, Pondurance Although artificial intelligence (AI) has been around for more than half a century, the advancements and hype surrounding the technology over the past couple of decades have led to much discussion and confusion about whether machines will someday replace humans in the workforce. A quick Google search reveals stories about…

Making Office IoT Attacks DOA

By Josh Wyatt, global executive services director, Optiv Security When we think about securing the internet of things (IoT), the conversation usually turns to the sensational – ranging from industrial controllers being compromised to bring down critical infrastructure, to automobile cruise control systems being hacked, to last year’s “holiday nightmare” security story where researchers found…

How to Stop the Insider Threat from Switching Off Your Security Lights

By Armaan Mahbod, manager, insider threat analyst team, Dtex Systems You’ve spent millions on security. You have the latest and smartest firewalls installed. You have deployed cutting-edge AI-powered antivirus solutions. Phishing emails are stopped cold by your expensive anti-spam and email security gateway solutions, some of the time at least. You are using a CASB…

Artificial Intelligence in Cybersecurity Is Vulnerable

By Celeste Fralick, chief data scientist and senior principal engineer, McAfee Just about everyone in the cybersecurity field has accepted the notion that adversaries are just as smart as we are. Anytime we celebrate the latest threat detection and prevention breakthrough, we’re well aware that the bad guys are at work devising ways to evade…

Buyer Beware: Autonomous Security is a Myth

Cybersecurity artificial intelligence (AI) needs to exist before it can save us. The excessive use of AI in marketing materials has left those looking for enterprise security solutions – CISOs, IT managers and SOC teams, unable to differentiate hype from real value. According to The State of Artificial Intelligence in B2B Marketing, nearly two-fifths of…

SOAR’s myopic focus may be its undoing

By Gunter Ollmann, CSO, Cloud and AI Security Division, Microsoft Practically every CISO I speak with ranks the difficulty in getting multiple vendors “best of breed” security products working together and returning any measurable ROI as a constant entry in their Top-5 daily gripes. As access to experienced security professionals become scarcer and more expensive,…

IllenaArmstrong

Here we are on the cusp of 30

By

Here we are, another year almost wrapped and I’m starting to rethink whether I’ve chosen the right profession. What’s set me on this path is a recent study I’ve been mulling, which basically reveals that cybercrime is, like, the hottest industry for career-minded professionals looking for lucrative occupations that could make them millions of dollars…

2019: The year of GDPR, CCPA: Brian Vecci

Now that we’re six months past the GDPR deadline, and almost a year away from the California Consumer Privacy Act, I’m still surprised to meet companies taking a wait-and-see approach to compliance. Rather than take action and adhere to the latest data privacy and protection standards, they are willing to wait until they see the…

Next post in Opinions