Sponsor Content news, articles & updates| SC Media

Sponsor Content

facebook

Hackers ran ad scams after hijacking account at Facebook data partner LiveRamp

Hackers took over the account of an employee at LiveRamp – one of Facebook’s significant data partners and a marketer extraordinaire that helps advertisers target ads – to access its Business Manager account and launch a campaign to run scam ads, tapping other user accounts to pay for them and deceiving customers. “The instance to…

The Dearth of Skilled Cybersecurity Personnel

The cybersecurity industry is currently experiencing a shortage of trained staff in epidemic proportions.   While complex and sophisticated malware is generated in increasing numbers daily, the skilled personnel needed to prevent or remediate the ever-increasing malevolent code is simply not to be found. In 2018-2019, 53 percent of organizations reported a “problematic shortage” of cybersecurity…

AI beyond semantics: Here’s what you need to know

Few know it, but AI has been around for the better half of a century, machine learning for decades and deep learning for a few years now, but consumers and companies struggle to identify the subsets of AI and what these distinctions mean. Many are unclear about the difference between machine learning and deep learning,…

Beating the Bullet: Moving Beyond EDR

How deep learning technology acts pre-emptively to stop attackers before they cause serious damage A core evaluation of artificial intelligence (AI) in cyber threat landscape indicates that AI is on the verge of overhauling the attack domain. Organizations need to be ready for the next wave of attacks because the reality on the ground will…

Managed Detection and Response:

Separating the players from the pretenders Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) addresses the fact that threat actors have increased their ability to circumvent traditional detection measures. As early as 2011, MDR emerged (uncategorized at the time) with a single guiding principal: Acknowledge that a breach…

How AI can be used for malicious purposes

The amplified efficiency of AI means that, once a system is trained and deployed, malicious AI can attack a far greater number of devices and networks more quickly and cheaply than a malevolent human actor. Given sufficient computing power, an AI system can launch many attacks, be more selective in its targets and more devastating…

The Advanced Threat Potential of Deep Learning

The objectives of Artificial Intelligence are to enhance the ability of machines to process copious amounts of data and to automate a broad range of tasks. While we’re currently enjoying many of the practical benefits of enhanced processing power such as language processing, autonomous cars or image recognition, like any capability, it can lend itself…

A Perpetual Problem: Tackling the Cybersecurity Skills Shortage

We read the overabundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and more interesting story. But first, let’s level set. This talent shortage is a well-recognized issue that grows year after year as qualified candidates become scarcer and demand grows. By 2022,…

Game on: Why hackers hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the epicenter of the battle between threat actors and the organizations responsible for protection. Consumers and businesses alike are sharing more data across an ever-expanding digital landscape that includes the cloud, mobile, IoT and more. So, organizations are increasingly challenged…

What are the odds? How vulnerable are you to the latest vulnerabilities?

Cybersecurity vulnerability management is a continuous race against time that is being compounded by the proliferation of new devices and applications within organizations. Between 2015 and 2019, data from exploit-db reveals that the number of distinct products with reported vulnerabilities increased by 150 percent. Over this same period, the weaponization time for the creation of…

Next post in Sponsor Content