IT Security Opinions | SC Media

Opinion

Why vendors who achieve ISO 27001 are important for audio/video buyers

Accreditations may seem like promotional mechanisms that appear on a vendor’s marketing material. Think again and take a closer look. As data compliance impacts organizations, enterprise leaders need to take vendors more seriously when standardizing on video conferencing solutions. It’s time to start conducting some thorough checks. ISO what? Data protection is the bastion of…

A sleeping security threat: How to protect against container compromise

Container technology makes it possible to independently package and run software across computing environments, improving software development efficiency and IT operations. Recent advances make it easier than ever to use, but security can’t be overlooked. Similar to the adoption of DevOps and cloud technologies, the introduction of containers expands an organization’s attack surface.  Attackers are…

Congratulations, cyber graduates!

This season millions of students will graduate from a college or university with a degree in their chosen field. This is a great milestone, and each and every one of them is to be congratulated for the fortitude and focus it took to earn their degrees. So, we congratulate the cyber graduates in finance and…

Zero trust: Trust no one, verify everything

Tried-and-true security solutions like URL filtering, anti-phishing software, firewalls, and other detection and signature-based solutions are able to mitigate most cybersecurity attacks. But they operate on the erroneous assumption that anyone and anything already inside of an organization network perimeter is safe and can be trusted. This line of thinking has long been proven incorrect,…

Automation and the existential opportunity

A lot of people are scared automation will eliminate their jobs. That’s going to be true in some industries, but ours is not one of them. Cybersecurity professionals who are accustomed to dealing with existential threats need to flip their mindsets and think of automation as an existential opportunity. There are millions of unfilled jobs…

Winning the cybercrime arms race with AI

The arms race between cybercriminals and cybersecurity professionals continues to escalate. And anyone watching the trajectory of this perpetual game of one-upmanship can see that this is a race towards implementing AI in the service of each side’s goals. For instance, a report by Nokia revealed that AI-powered botnets look for vulnerabilities in Android devices,…

7 Critical Security Steps to Protect You From an Office 365 Compromise

In August 2018, security researchers announced that cybercriminals were successfully bypassing Office 365’s Advanced Threat Protection via a new evolution of phishing – inserting malware links into SharePoint documents. Analysts at the cloud security firm Avanan discovered this vulnerability – reporting that SharePoint invitations containing malicious links were being sent from Microsoft to some users.…

Transient devices require strict control measures as regulatory compliance requirements grow

TThe proliferation of BYOD and portable media devices is increasing the cybercrime attack surface exponentially. TechAdvisory.org reports that 25 percent of malware is spread today through USB devices alone. Transient cyber assets  — or devices not connected to the network all the time (which includes USB devices) — are proving to be an acute vulnerability…

Next post in Executive Insight