IT Security Opinions | SC Media

Opinions

SOAR’s myopic focus may be its undoing

By Gunter Ollmann, CSO, Cloud and AI Security Division, Microsoft Practically every CISO I speak with ranks the difficulty in getting multiple vendors “best of breed” security products working together and returning any measurable ROI as a constant entry in their Top-5 daily gripes. As access to experienced security professionals become scarcer and more expensive,…

IllenaArmstrong

Here we are on the cusp of 30

By

Here we are, another year almost wrapped and I’m starting to rethink whether I’ve chosen the right profession. What’s set me on this path is a recent study I’ve been mulling, which basically reveals that cybercrime is, like, the hottest industry for career-minded professionals looking for lucrative occupations that could make them millions of dollars…

2019: The year of GDPR, CCPA: Brian Vecci

Now that we’re six months past the GDPR deadline, and almost a year away from the California Consumer Privacy Act, I’m still surprised to meet companies taking a wait-and-see approach to compliance. Rather than take action and adhere to the latest data privacy and protection standards, they are willing to wait until they see the…

Automated Analysis: Answering the call for improved security in connected devices

By Brian Russell, advisor, VDOO The line between physical and digital has blurred. Cyberattacks against digital assets have an effect on the physical world and increase risk exposure for both manufacturers and implementers. Security incidents such as the VPNFilter attack on the only Ukrainian chlorine plant for water treatment or the discovered vulnerabilities on police…

Data Breaches Caused by Misconfigured Servers

Misconfigured server infrastructure is often considered one of the most significant causes of data breaches within the IT industry. This human error phenomenon is usually unintentional, but it can have catastrophic consequences regarding the exposure of sensitive personal information as well as potentially damaging the reputation of your business. Data breaches have gathered a lot…

Cryptojacking: Defending against the latest pernicious cyberthreat

By David Cramer, President of Digital Service Operations (DSO) at BMC Mining for digital currency can be a profitable business, but it requires a lot of computing power. That’s why criminal hackers have been breaking into corporate networks and hijacking servers to run cryptomining software. Enterprises need to defend themselves against this pernicious new threat,…

Management of “Fake News” on Social Media Will Continue On Its Downward Spiral

By Brian NeSmith, CEO and co-founder of Arctic Wolf Networks Over half of the population claims to regularly see fake news on sites such as Facebook or Twitter. Yet, despite fake news being more commonplace than one would think, social media companies have been highly ineffective in doing anything — except around the most egregious…

Bots Are an Existential Threat to Our Economy

By Tiffany Olson Kleemann, CEO, Distil Networks In 1998, “Titanic” became the first movie to gross $1 billion, the Michael Jordan-led Chicago Bulls won their sixth NBA championship, and President Bill Clinton was impeached but acquitted of wrongdoing in the Monica Lewinsky scandal. It also was the year when bots – pieces of software that run automated tasks over…

Next post in Opinions