IT Security Opinions | SC Media

Opinion

Internet of Insecure Things

The Internet of Things (IoT) includes devices using network connectivity such as consumer, industrial, health care and critical infrastructure systems. In 2016, attacks against vulnerable IoT devices featured prominently in the daily news headlines. Hundreds of thousands of IoT devices were used to build botnets and wage some of the largest DDoS attacks against organizations…

jerome segura

The highs and lows of Windows Updates

As with all large companies, Microsoft’s every move is highly scrutinized by external observers. Although some people are just there for the bashing, this is actually a normal and healthy situation that allows a large community to give feedback and raise concerns when the Redmond giant heads into the wrong direction. One always highly anticipated…

10 Words to Watch in Security for 2017

Cybersecurity has dominated the news cycle this year and 2017 will continue that trend, bringing the issue front and center in boardrooms and the situation room, but a new vocabulary is evolving to describe and deal with these threats. So for 2017, rather than continue to make predictions on which technology to watch, what organization…

The Case for Behavioral Analysis

Behavioral detection relies on observing the execution of a program, the sample, and inferring malicious intent based on those observations. This is usually done in a contained and instrumented environment like a sandbox, but can also occur during real time execution on a real end point host. Most network security solutions do not require the…

Vulnerability Intelligence in the Age of Rapid Exploitation and Patch Fatigue

With the advent of automated malware creation, distribution and attacks, InfoSec teams are finding that protection tools — firewalls, intrusion detection and prevention systems (IDS/IPS), anti-virus products and others — are becoming less effective. This protection approach, based on threat intelligence, worked well before hackers found a way to quickly disguise malware and speed up…

Top 10 Ways To Achieve Agile Security

According to Cybersecurity Ventures, worldwide spending on cybersecurity will top $1 trillion between 2017 and 2021. From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more concerns with cybersecurity than ever before. Cloud has brought benefits such as agility, scalability,…

Next post in Executive Insight