Perspectives news, articles & updates| SC Media

Perspectives

Three reasons the ‘moving target defense’ can stop bot attacks

The cybersecurity industry has an effectiveness problem. Despite thousands of available tools, breaches continue unabated. If these tools – which often overstate the effectiveness of artificial intelligence and machine learning – were enough to solve the problem, they would have done so by now.  Headlines often capture stories of large-scale breaches, but leave out pertinent…

Why it’s time to prioritize communications security

Every once in a while, something happens where you throw your hands up and say: “That’s what I’ve been saying!” No, it wasn’t when NFL analysts predicted that my Dallas Cowboys will play well this year. Instead, it was when I read a story about how over the summer, hackers took control of various Twitter…

Five tips for hiring the right cybersecurity talent

With the huge number of recent layoffs in tech, there’s never been a better time to fill the company’s open security headcount. But this doesn’t mean companies can pick up a six-pack of senior security pros for a song. Here are some ways hiring managers can put their best foot forward and prepare to retain…

Persistent phishing: don’t take the bait from BECs

Cybercriminals are opportunists by nature, so it’s no surprise to see that they continuously exploit attack vectors that have been proven to show success. Of these attack vectors, phishing and business email compromises (BECs) are often the most fruitful. With the significant frequency and value of phishing and BEC scams, many criminals turn to this…

How to foster a secure and compliant DevOps culture

It’s challenging to talk about DevOps and compliance together. Most people think of DevOps as a philosophical approach to software development that empowers developers, speeds time-to-market and reduces cost—without sacrificing quality. DevOps supports new approaches, while encouraging individual experimentation and decision-making. While DevOps offers flexibility and makes software teams more productive, it can create problems…

Security Automation: when, why, and how

IT automation started out with administrators making simple tools that would help them accomplish the same task again and again. Today, IT automation has grown into its own industry, as there has been an increasing need to meet the growth of IT itself. Security automation isn’t far behind. As any environment grows, the need for…

How to speed-up security deployments in industrial organizations

Security pros often view cybersecurity as a process, not a result. But in business, it’s regularly implemented in pieces or projects, each with its own timeline, goals, and results. The way an organization conducts such projects can actually reveal where there’s room for improvement in terms of management and processes, which will ultimately speed up…

Next post in Perspectives