Perspectives news, articles & updates| SC Media

Perspectives

Lock down home workers with a mix of tech tools and policies

Security pros face unending attacks and challenges as they try to maintain business continuity while employees work-from-home. Now that the majority of the staff works beyond the network perimeter, the escalating threats are real, driving opportunistic threat actors to ramp up their phishing efforts. For example, Google found earlier this year that 18 million phishing…

Get ready for the next DDoS attack

When the first DDoS attack took place more than 20 years ago, the intent was to disrupt a university, not necessarily cause economic or physical damage. But it was so successful that we saw repeat attacks on major global websites, including Amazon, Yahoo and CNN. Today, DDoS has become one of the more damaging cyberthreats…

Give employees the right tools to defend against phishing attacks

There’s a direct correlation between data breaches and sophisticated phishing attacks. Stolen records are sold on the dark web, and then cross-referenced and merged with personal information from previous breaches. Notable data theft events from Equifax and EDGAR have made it easier for criminals to launch targeted phishing campaigns against high-value organizations. To protect against…

Protecting data in the work-from-home age

The ongoing COVID-19 pandemic has upended life for millions of people around the world, especially when it comes to work. While the remote work lifestyle has its perks and complications, there’s no denying it’s also introduced a dramatically heightened risk of data loss. Scores of employees who have never been trained to securely work from…

How to make security simple for IT users

Companies could make corporate IT environments a lot safer from external threats if those pesky humans would stop clicking on so many sketchy links. Or sharing passwords. Or using bad passwords. Or finding loopholes in the corporate security policy. Users tend to carry their fair share of blame for data loss and cyberattacks. Human error…

5 traits all the best CISOs have

As someone regularly hired to lead red-team engagements that hack into Fortune 500 organizations, I’ve had the opportunity to work with – and go up against – many different types of security leaders. Some are technical, others thrive on adrenaline. Some dig deep into the weeds, and still others prefer the C-suite. Each type brings…

Security pros must keep up with the telehealth explosion

Telehealth, once considered a luxury that only around half of hospitals offered, has accelerated during the COVID-19 pandemic. It’s become an invaluable tool for a population living with social distancing, giving patients the opportunity to seek medical consultations using today’s digital technologies. The recent growth in telehealth has been dramatic. Projections from Forrester Research predict…

Why we must arm police with facial recognition systems

It’s now evident in the U.S. that there are pockets within police departments that have demonstrated racial bias. This has resulted in a justified reaction from the public against them. And unlike most other western countries, in the U.S., both the police and many in the public are armed with guns, which tends to make…

Counterpoint: The hidden threat of facial recognition

Civil rights advocates have long warned that facial recognition technology was open to abuse by government efforts to identify and track protesters. Those fears were borne out several years ago when records revealed that law enforcement deployed the technology on people protesting the Freddie Gray incident in Baltimore. Civil rights advocates have also warned for…

How to keep political campaigns secure

Political campaigns in the United States and abroad have been riddled the past several years with successful and unsuccessful cyberattacks. Now, it’s a presidential election year and not enough has changed to stop history from repeating itself. Campaigns still have a bullseye on their backs and bad actors are firing. Not to mention that COVID-19…

Next post in Perspectives