IT Security Opinions | SC Media

Opinions

Don’t Underestimate the Power of Privilege

By Chris Stoneff, vice president of security solutions, Bomgar In today’s world cyberattacks have become ubiquitous. Consider the famous words of former Cisco CEO John Chambers, “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked.” So, if it’s inevitable that intruders will get in,…

California’s new IoT security law is not nearly enough – We need a GDPR for IoT…NOW!

By Sudhakar Ramakrishna, CEO, Pulse Secure After years of undisclosed breaches, stolen identities and negligent data handling, Europe’s General Data Protection Regulation (GDPR) is forcing companies to get serious about data privacy. Lawsuits against Google and Facebook were filed the day GDPR went into effect, and it appears the law’s teeth will soon be tested…

Using Social Auth with Your App? 4 Steps to Protect Your Users and Mitigate Security Concerns

By Keith Casey, Okta API Problem Solver Another day, another breach headline. What’s unique about the latest Facebook breach is that it’s the source of truth for many other companies and applications who use social platforms for authentication. A vulnerability in a social authentication service has far-reaching effects across thousands of apps and millions of users.…

An Election Day cyberattack scenario

By Steve Grobman, CTO, McAfee With Election Day set to begin there are any number of methodologies cybercriminals, nation-state actors or any hacker could use to disrupt the U.S. election. Here is one possible scenario. A malicious actor, foreign or domestic, could take advantage of the lack of .gov validation and SSL protection to spread…

5 steps for securing connected medical devices

Patients expect hospitals to be safe havens, but more and more we’re seeing that the weakest and most critical assets in hospital networks are the very instruments needed to save lives: medical devices. With the increase in connected medical devices, the risk for malicious attacks is growing. Eighty percent of hospitals were attacked during the last…

Catching all Threats – Known, Unknown, and Unknown Unknown — Before They Can Harm You

By Joshua Behar At a news briefing in 2002, then U.S. Secretary of Defense Donald Rumsfeld, famously broke down threats into three categories of “knowability”: “Known knowns,” are the threats we are fully aware of; “known unknowns,” are the things we know we don’t know; and finally, the “unknown unknowns” – those threats that we…

1 billion reasons why compliance matters

By Jason Wang, CEO of TrueVault The European Union’s General Data Protection Regulation (GDPR) is starting to show its teeth as regulators evaluate penalties for Facebook after a high-profile security breach of user data. If Facebook is found to be in violation of GDPR, the technology company could be facing more than $1 billion (roughly…

The Privacy Professional: A Modern Day Renaissance Man

Omer Tene, VP & Chief Knowledge Officer, International Association of Privacy Professionals (IAPP) Hollywood writers could not have scripted it better. Merely a month before the implementation date of the General Data Protection Regulation (GDPR) in May this year, a data protection scandal roils the world. A whistleblower reveals the leakage of personal data from Facebook…

Bridging the cybersecurity skills gap through AI

By Tom Le, CTO, Cognizant Security Cybersecurity is one of the most pressing issues facing organizations around the world. In 2017 alone, U.S. companies averaged 40 security incidents at a cost of $1.3 million each. While cybersecurity’s rising importance is spurring a wave of new technologies and innovations, humans are the ultimate masterminds behind cybersecurity…

Winning the Botnet Wars

By Anthony Giandomenico, Senior Security Strategist and Researcher, FortiGuard Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions…

Next post in Executive Insight