Sponsor Content news, articles & updates| SC Media

Sponsor Content

The Advanced Threat Potential of Deep Learning

The objectives of Artificial Intelligence are to enhance the ability of machines to process copious amounts of data and to automate a broad range of tasks. While we’re currently enjoying many of the practical benefits of enhanced processing power such as language processing, autonomous cars or image recognition, like any capability, it can lend itself…

A Perpetual Problem: Tackling the Cybersecurity Skills Shortage

We read the overabundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and more interesting story. But first, let’s level set. This talent shortage is a well-recognized issue that grows year after year as qualified candidates become scarcer and demand grows. By 2022,…

Game on: Why hackers hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the epicenter of the battle between threat actors and the organizations responsible for protection. Consumers and businesses alike are sharing more data across an ever-expanding digital landscape that includes the cloud, mobile, IoT and more. So, organizations are increasingly challenged…

What are the odds? How vulnerable are you to the latest vulnerabilities?

Cybersecurity vulnerability management is a continuous race against time that is being compounded by the proliferation of new devices and applications within organizations. Between 2015 and 2019, data from exploit-db reveals that the number of distinct products with reported vulnerabilities increased by 150 percent. Over this same period, the weaponization time for the creation of…

Break Up With Your Insecure VPN

The inconsistent connections and the constant feeling of insecurity cannot be forgiven or forgotten— it is time to move on and break up with your VPN. In the 90s, the VPN was all the rage in cybersecurity. The creation of the ability for a private connection on the internet between a multitude of users and…

Sharing is caring—and smart

If your organization is involved in critical infrastructure such as public utilities, finance, healthcare, national defense, technology, or a similar field, nation-state attackers have put a huge target on your network. Considering the sophistication and ongoing nature of attacks against your networks, it’s important to secure your infrastructure. A 1998 executive order designed to protect…

Kill the VPN. Move to Zero Trust

We’re a modern workforce, working anywhere and everywhere. The days of a fixed and easily identifiable perimeter are long gone, meaning depending on traditional VPNs is no longer an effective or secure means for remote access. In fact, it’s dangerous. Today’s network landscape is complex and elusive with distributed applications, people, and data. Our expanding…

Patch Before Perish

Cybersecurity vulnerability management is a continuous race against time compounded by device and application proliferation across cloud, IoT and mobile workers. This expanding attack surface increases pressure on resource-constrained security teams to patch before possible exploitation. Scanning platforms have improved, but comprehensive vulnerability management solutions still lack timely patch management capabilities. In a recent Ponemon…

The Secure Access Paradigm Shift to Zero Trust

The basic principles of securing access to critical information have not changed, but the ecosystem your information resides in has transformed significantly. Changes in business and IT operations have introduced unnecessary complexity and risk to modern enterprise. However, the time has come for organizations to change their approach to security, or risk facing the consequences…

Ponemon offers best practices for threat intelligence

In February 2019, the Ponemon Institute conducted its The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies. Following is an excerpt from that extensive study, sponsored by Anomali. The importance of threat intelligence as part of an IT security mission should encourage organizations to take steps to improve how it…

Next post in Sponsor Content