IT Security Opinions | SC Media

Opinion

Election hacking not fundamentally a cyber issue

Regarding the possibility of a foreign state influencing the outcome of an election due to cyber influence, the most important thing to understand is that hacking an election isn’t, fundamentally, a cyber-issue.  Nation states and “ non-state actors” (e.g. terrorist organizations, political parties, special interest groups, etc.) have always sought to influence elections through diplomacy and…

Flagging Treacherous Ground: Converting Security Liabilities into Assets

New school security awareness training has become an integral part of the layered security posture developed by many organizations large and small. In an era where zero day exploits are regularly delivered to users’ inboxes and even the best anti-virus engines routinely miss newly released malicious files and links, users are truly the last the…

Difficulty Level – “EXTREME”: Why is attribution such a challenge?

When I was serving in cybersecurity in the Department of the Defense, the main lesson I learned was that you can never truly achieve a high-level of confidence in who is attacking you without the triangulation of multiple intelligence sources.  The nation-state actors our team investigated were very adept at obfuscating activities through multiple command…

jerome segura

Microsoft Office: In the line of fire

One of Microsoft’s most popular products (at least in terms of revenues) is the Office suite, with the famous Word, Excel, Outlook and PowerPoint. In fact, the hegemony of the productivity software is not just limited to Windows PCs but also expands onto Macs, despite attempts from Apple at making their own version. The simplicity,…

A Holistic Security Architecture May Just Help Avoid Future Liability

Digitization is invading all aspects of business, government and daily living. As a result, we are facing myriad new possibilities and new demands. Now more than ever, security must be addressed pervasively across the growing community of those with whom we connect, both directly and indirectly. Awareness of this need is driving continued proliferation of…

WikiLeaks, the CIA and Your Phone

WikiLeaks is an organization that has made a name for itself by leaking classified government documents relating to national security, warfare, surveillance programs, and government corruption.  WikiLeaks has leaked millions of documents, many of which were designated secret or top secret. Conspicuously absent from WikiLeaks’ efforts are leaks related to Russia or China. However, back…

Cyber terrorism: how the security technology community can help

Over the past few years, there’s been a lot of talk about nations state attackers and the impeding reality of Cyberwar.  There’s been a lot less talk about protecting against cyber terrorism, although it’s an area ripe for the kind of technological innovation that security vendors can provide.  It’s an area that they should be…

Phishing with a Light Touch: Advances In Social Engineering

The bad guys who run phishing campaigns are nothing if not relentlessly innovative. In our consideration of new trends in phishing, though, we often focus exclusively on the technical innovations of the malware delivered to users’ desktops. While the developments in malicious software have been striking in the past few years, especially those surrounding ransomware,…

Next post in Executive Insight