IT Security Opinions | SC Media

Opinion

How to craft a U.S. privacy law fit for a tech company

Facebook, Google, IBM, and Microsoft have all reportedly “aggressively lobbied” the current administration to start developing a federal privacy mandate. Recently, Cisco joined that chorus of tech giants (“Big Tech”) calling for stronger American privacy laws. Intel has gone a few steps further, drafting its own version of a U.S. privacy bill and opening an…

Part 5 – Cooperative cybersecurity protection for large-scale infrastructure

Developing your own infrastructure protection solution The era of governments protecting business and citizens from serious attacks, including from foreign adversaries, may have already passed – at least in the context of cybersecurity. That is, while it remains reasonable to expect government protect against physical attacks such as from bombs and missiles, as a general…

Part 4 – Cooperative cybersecurity protection for large-scale infrastructure

Building a collective platform Any commercial platform to support collective security operations must have certain functional attributes and operational capabilities to work properly in practice. In this section, we lay out the salient aspects of such a platform, trying to maintain some degree of generic design. Enterprise security teams considering use of a platform supporting…

Part 3 – Cooperative cybersecurity protection for large-scale infrastructure

Cybersecurity analytics for large-scale protection Click here for part 2. Most modern security analytic methods and tools are best suited to larger infrastructure with large data sets. That is, it is unlikely that one would use real-time, telemetry-based monitoring with 24/7 coverage for a personal computer, unless that personal computer was connected to a larger…

Part 2 – Cooperative cybersecurity protection for large-scale infrastructure

Cyberthreats to infrastructure Click HERE for Part One Any cooperative effort that supports large-scale infrastructure protection must begin with an accurate perception of the real cyber risks that must be addressed. Experts understand that risk is measured by combining the probability of bad outcomes with the consequences of such outcomes. In the context of infrastructure…

Why is election security a partisan issue?

Frankly I never thought that securing the elections would be a partisan issue.  But then, why am I surprised?  Anything that touches Washington becomes a partisan issue.  Securing the elections, ensuring ballot machines can’t be hacked, and ensuring voter registration data isn’t altered or deleted should be a common goal for everyone in Washington.    Elections…

Shadow IT: The silent cloud migration killer

As more organizations see the benefits the cloud can offer, enterprises are eager to implement cloud migration strategies. By next year, Gartner forecasts that 75 percent of organizations will take the next step and deploy a multicloud or hybrid cloud model to meet their IT needs. As with any major IT shift, there are several…

Next post in Executive Insight