Cybersecurity Executive Insight, opinions and analysis l SC Media

Executive Insight

How Online Gaming Companies Can Forecast & Protect Against DDoS

By Daniel Smith, head of security research, Radware’s emergency response team One of the most significant issues facing the online gaming industry is service availability as large-scale Distributed Denial of Service (DDoS) attacks are still an everyday occurrence. Unfortunately, denial of service attacks have always and will always be a part of the gaming culture,…

Don’t Underestimate the Power of Privilege

By Chris Stoneff, vice president of security solutions, Bomgar In today’s world cyberattacks have become ubiquitous. Consider the famous words of former Cisco CEO John Chambers, “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked.” So, if it’s inevitable that intruders will get in,…

California’s new IoT security law is not nearly enough – We need a GDPR for IoT…NOW!

By Sudhakar Ramakrishna, CEO, Pulse Secure After years of undisclosed breaches, stolen identities and negligent data handling, Europe’s General Data Protection Regulation (GDPR) is forcing companies to get serious about data privacy. Lawsuits against Google and Facebook were filed the day GDPR went into effect, and it appears the law’s teeth will soon be tested…

Using Social Auth with Your App? 4 Steps to Protect Your Users and Mitigate Security Concerns

By Keith Casey, Okta API Problem Solver Another day, another breach headline. What’s unique about the latest Facebook breach is that it’s the source of truth for many other companies and applications who use social platforms for authentication. A vulnerability in a social authentication service has far-reaching effects across thousands of apps and millions of users.…

An Election Day cyberattack scenario

By Steve Grobman, CTO, McAfee With Election Day set to begin there are any number of methodologies cybercriminals, nation-state actors or any hacker could use to disrupt the U.S. election. Here is one possible scenario. A malicious actor, foreign or domestic, could take advantage of the lack of .gov validation and SSL protection to spread…

5 steps for securing connected medical devices

Patients expect hospitals to be safe havens, but more and more we’re seeing that the weakest and most critical assets in hospital networks are the very instruments needed to save lives: medical devices. With the increase in connected medical devices, the risk for malicious attacks is growing. Eighty percent of hospitals were attacked during the last…

Catching all Threats – Known, Unknown, and Unknown Unknown — Before They Can Harm You

By Joshua Behar At a news briefing in 2002, then U.S. Secretary of Defense Donald Rumsfeld, famously broke down threats into three categories of “knowability”: “Known knowns,” are the threats we are fully aware of; “known unknowns,” are the things we know we don’t know; and finally, the “unknown unknowns” – those threats that we…

1 billion reasons why compliance matters

By Jason Wang, CEO of TrueVault The European Union’s General Data Protection Regulation (GDPR) is starting to show its teeth as regulators evaluate penalties for Facebook after a high-profile security breach of user data. If Facebook is found to be in violation of GDPR, the technology company could be facing more than $1 billion (roughly…

Next post in Executive Insight