Perspectives news, articles & updates| SC Media

Perspectives

Only a Public-Private Partnership Can Secure the Electric Grid

President Trump recently issued an Executive Order to bar the purchase of certain critical electrical grid components from foreign adversaries. This order—like a similar telecommunications order released last year—reflects an acknowledgment by the federal government of a longstanding cyber threat to the electric grid posed by compromised equipment.  As with other threats to our critical…

Deliver More Effective Threat Intelligence with Federated Machine Learning

Cybercriminals never stop innovating. Their increased use of automated and scripted attacks that increase speed and scale makes them more sophisticated and dangerous than ever. And because of the volume, velocity and sophistication of today’s global threat landscape, enterprises must respond in real-time and at machine speeds to effectively counter these aggressive attacks. Machine learning…

XDR: The New Cybersecurity X Factor

By

By correlating threat telemetry across multiple attack surfaces, XDR – Extended Detection and Response – promises to address today’s harsh threat landscape by amplifying the scale, speed, and scope in which security pros can detect and remediate attacks. We call it the X-Factor. Now, XDR automates manually intensive big data investigations, which will help security…

5 Ways Security Can Ensure Business Continuity in the COVID-19 Era

The COVID-19 pandemic has become a wake-up call for companies to sharpen their business continuity plans. As the crisis continues on, many realize the business continuity strategies they have in place aren’t equipped to safeguard against the new and evolving security risks of the remote workforce, or resilient enough to sustain business operations through another…

5 Tips for Safer Zoom Calls at Your Company

Zoom has emerged as a poster child for video conferencing in our new work-from-home economy. As much of a cultural icon Zoom has become during the Covid-19 period, the company has faced some serious security issues. Cybersecurity firm Cyble released a report in mid-April detailing that a credential stuffing campaign compromised some 500,000 Zoom accounts…

Derailing Ransomware 2.0 Requires EPPs, EDRs and Advanced Deception Tools

Many cybercriminals secure their most lucrative payouts by sticking to classic forms of attack, with a bit of a new twist. As ransomware has evolved and become more disruptive, it’s keeping security pros on their toes and compelling adjustments to their defense postures.   Today, newer ransomware programs such as Zeppelin and REvil/Sodinokibi, and others…

5 IoT Security Tips for Stay-At-Home Workers

As millions of employees across the world work from home because of the COVID-19 pandemic, IoT security has become more critical than ever as cybercriminals look to exploit the situation. Over the past few years, many organizations already have put security controls and measures in place that ensure only authorized users can access and configure…

Securing Work from Home Wi-Fi Access

Wi-Fi networks, whether in public or private, are by their very nature dirty. Security professionals warn that every network carries inherent risk to our devices, data and resources, because they are exposed a myriad of attacks, including these “Dirty Half Dozen” Wi-Fi risks: eavesdropping; exploits; evil-twin Wi-Fi; lateral network infections; DNS hijacking; and scanning, enumerating…

Next post in Executive Insight