IT Security Opinions | SC Media

Opinion

3.14 National Pi Day: Numbers that matter for security leaders

By Rick McElroy, Head of Security Strategy for Carbon Black Few numbers can claim more fame than Pi. Infinite and irrational, Pi represents a mathematical constant – the ratio of a circle’s circumference to its diameter. When it comes to cybersecurity, industry pros, especially the math-minded and data scientists among us, can surely relate to…

Protecting the Critical Infrastructure from cyber warfare

Cyber attacks are hard to prevent. A cyberattack against our nation’s critical infrastructure (CI) is especially hard to thwart and could have devastating consequences to our human existence. Most everyone is aware of the catastrophic risk the electrical grid faces from a cyberattack. To put it in perspective, a complete outage of the electrical grids…

Under GDPR, can a CISO be the DPO?

The General Data Protection Regulation (GDPR) is a European Union regulation that was instituted on May 25th, 2018 to rule on how companies and entities should address and ensure personal data protection. More specifically, the GDPR is a set of guidelines on how companies must manage their IT landscapes, staff, partners and operational processes in…

Improving security with micro-segmentation: Where do I start?

The irreversible movement from on-premise data centers to virtualized, hybrid-cloud infrastructures has raised a major security challenge for enterprises: how to protect mission-critical applications and workloads from threats lurking within the data center. Traditional network-based security boundaries are no longer effective in today’s dynamic, heterogeneous environments. Based on everyday news accounts, attackers are breaching perimeter…

Privacy means more than meeting a compliance checklist

Global and domestic privacy regulations like GDPR and the California Consumer Privacy Act (CCPA) are forcing businesses to develop and implement comprehensive data management processes to comply with new privacy requirements. Paul Iagnocco In this age of compliance, privacy strategies have become ongoing initiatives, rather than one-time implementations. New privacy-by-design principles can help companies integrate…

Beyond cyber awareness month

While National Cybersecurity Awareness Month and Critical Infrastructure Security and Resilience Month are important moments in time to direct our attention to cybersecurity challenges, the reality is we need more than two months of cyber conversation. We need a continuing, year-round dialog about why cybersecurity matters. It’s important to weigh the combination of people, process…

IllenaArmstrong

Making cybersecurity great now

By

History tells tales. When I travel during days off to other regions of the world, I look for the fun spots but also the sites honoring the city’s turbulent periods. I’ve learned that these often mournful times comprising a region’s history also play parts in a present day that shows how equity, hope, goodness and…

Going to RSA? How to leave with more than a buzzword hangover this year

Jason Lamar, Sr. Director, Product Management, Security Business Group, Cisco Security professionals are under a lot of pressure to stay on top of the latest developments. Nobody wants to say, “I don’t know,” when their boss asks them about whatever buzzy topic is making headlines in the tech journals this month. And, let’s be real,…

The role of the CISO during a cyber crisis

By: Stephen Moore The role of a chief information security officer (CISO) can never be miscategorized as low-stress. As cyberthreats become more incessant and malicious, a CISO’s job is increasingly difficult, and the challenge of safeguarding corporate, customer and employee data along with intellectual property becomes even more challenging. The person hired for this position…

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say they’ve experienced…

Next post in Opinion