IT Security Opinions | SC Media

Opinion

Limor Kessem

WannaCry: New Twist on an Old Bug

Since the morning of Friday, May 12, 2017, ransomware known as “WannaCry” has lived up to its name, wreaking havoc across the globe in industries ranging from hospitals to telecommunications and distribution/supply chain services around the world. The speed and scale at which WannaCry spread sent both companies and security research teams scrambling to put…

Security Is No Longer A Vertical

Think about the org chart for your IT department. If security is a siloed and vertical team that reports straight up to the CIO just like engineering or infrastructure, you’re definitely not alone. But the bad news is, that legacy approach isn’t going to work in the new era of technology services. The traditional way…

Cyber Talk: What You Don’t Know Will Hurt You

It’s not easy for an organization to defend against the frequency, sophistication and wide range of attackers seeking to compromise a network, obtain intellectual property or bring business operations to a halt. And all too often, we see executive teams resort to buying a broad range of solutions as the answer to growing cyber threats,…

Can Congress do anything to address SS7 risks? Some say yes

Politicians are becoming increasing aware and concerned about cybersecurity issues.  One need look no further than two recent letters written by Senator Ron Wyden (D-Ore), senior member of the Senate Intelligence Committee, and Representative Ted Lieu (D-Calif.).  Both are leading congressional advocates for stronger cybersecurity and privacy measures. The first letter was sent on March…

Election hacking not fundamentally a cyber issue

Regarding the possibility of a foreign state influencing the outcome of an election due to cyber influence, the most important thing to understand is that hacking an election isn’t, fundamentally, a cyber-issue.  Nation states and “ non-state actors” (e.g. terrorist organizations, political parties, special interest groups, etc.) have always sought to influence elections through diplomacy and…

Flagging Treacherous Ground: Converting Security Liabilities into Assets

New school security awareness training has become an integral part of the layered security posture developed by many organizations large and small. In an era where zero day exploits are regularly delivered to users’ inboxes and even the best anti-virus engines routinely miss newly released malicious files and links, users are truly the last the…

Difficulty Level – “EXTREME”: Why is attribution such a challenge?

When I was serving in cybersecurity in the Department of the Defense, the main lesson I learned was that you can never truly achieve a high-level of confidence in who is attacking you without the triangulation of multiple intelligence sources.  The nation-state actors our team investigated were very adept at obfuscating activities through multiple command…

jerome segura

Microsoft Office: In the line of fire

One of Microsoft’s most popular products (at least in terms of revenues) is the Office suite, with the famous Word, Excel, Outlook and PowerPoint. In fact, the hegemony of the productivity software is not just limited to Windows PCs but also expands onto Macs, despite attempts from Apple at making their own version. The simplicity,…

A Holistic Security Architecture May Just Help Avoid Future Liability

Digitization is invading all aspects of business, government and daily living. As a result, we are facing myriad new possibilities and new demands. Now more than ever, security must be addressed pervasively across the growing community of those with whom we connect, both directly and indirectly. Awareness of this need is driving continued proliferation of…

Next post in Executive Insight