IT Security Opinions | SC Media

Opinions

How CISOs can tell a better security story to their board

By Ed Bellis, co-founder, CTO, Kenna Security Historically, when CISOs have been called to speak to their organization’s board of directors, it was an uncommon event. Just a decade ago, the CISO who presented more than once per year was a rare bird. Times have changed. Boards of directors are taking an interest in cybersecurity…

How Online Gaming Companies Can Forecast & Protect Against DDoS

By Daniel Smith, head of security research, Radware’s emergency response team One of the most significant issues facing the online gaming industry is service availability as large-scale Distributed Denial of Service (DDoS) attacks are still an everyday occurrence. Unfortunately, denial of service attacks have always and will always be a part of the gaming culture,…

Don’t Underestimate the Power of Privilege

By Chris Stoneff, vice president of security solutions, Bomgar In today’s world cyberattacks have become ubiquitous. Consider the famous words of former Cisco CEO John Chambers, “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked.” So, if it’s inevitable that intruders will get in,…

California’s new IoT security law is not nearly enough – We need a GDPR for IoT…NOW!

By Sudhakar Ramakrishna, CEO, Pulse Secure After years of undisclosed breaches, stolen identities and negligent data handling, Europe’s General Data Protection Regulation (GDPR) is forcing companies to get serious about data privacy. Lawsuits against Google and Facebook were filed the day GDPR went into effect, and it appears the law’s teeth will soon be tested…

Using Social Auth with Your App? 4 Steps to Protect Your Users and Mitigate Security Concerns

By Keith Casey, Okta API Problem Solver Another day, another breach headline. What’s unique about the latest Facebook breach is that it’s the source of truth for many other companies and applications who use social platforms for authentication. A vulnerability in a social authentication service has far-reaching effects across thousands of apps and millions of users.…

An Election Day cyberattack scenario

By Steve Grobman, CTO, McAfee With Election Day set to begin there are any number of methodologies cybercriminals, nation-state actors or any hacker could use to disrupt the U.S. election. Here is one possible scenario. A malicious actor, foreign or domestic, could take advantage of the lack of .gov validation and SSL protection to spread…

5 steps for securing connected medical devices

Patients expect hospitals to be safe havens, but more and more we’re seeing that the weakest and most critical assets in hospital networks are the very instruments needed to save lives: medical devices. With the increase in connected medical devices, the risk for malicious attacks is growing. Eighty percent of hospitals were attacked during the last…

Catching all Threats – Known, Unknown, and Unknown Unknown — Before They Can Harm You

By Joshua Behar At a news briefing in 2002, then U.S. Secretary of Defense Donald Rumsfeld, famously broke down threats into three categories of “knowability”: “Known knowns,” are the threats we are fully aware of; “known unknowns,” are the things we know we don’t know; and finally, the “unknown unknowns” – those threats that we…

Next post in Executive Insight