Perspectives news, articles & updates| SC Media

Perspectives

5 Ways to Translate Security Data into Actionable Business Insight

Security data can drive larger decisions about where an organization’s biggest business risks lie and how to best mitigate them. But two interwoven challenges prevent companies from drawing out that value: First, security teams are too overwhelmed by their data to analyze and use it effectively. Second, security leaders cannot translate that data and what…

How Do CCPA and GDPR Differ? CCPA Requires More Effective Data Management

The enforcement deadline for the California Consumer Privacy Act (CCPA) passed a couple of weeks ago, so for all intents and purposes it’s now in effect. The CCPA was modeled after the European Union’s General Data Protection Regulation (GDPR) that requires companies to share how personal data gets collected and gives consumers the option to…

5 Ways to Stay Safe on Tax Day

Each year, cybercriminals gather on the dark web in preparation for one of the great cybercrime events in the world: Tax Day in the United States. As millions of Americans prepare to file their taxes on Wednesday, hackers are taking to the infamous dark web marketplaces in a flurry of activity aimed at the buying…

5 Ways to Create a Security-First Mindset

Now that millions of people are suddenly working from home because of the COVID-19 pandemic, companies need ways to create a connected and protected remote business and workforce.  This switch to remote work has accelerated digital transformation efforts at many companies. A recent survey by OpsRamp found that 73 percent of IT managers expect to…

5 Elements of Next-Gen Deception Technology

Honeypots are deception technology’s earliest ancestor. IT security researchers started using them in the 1990s to deceive malicious actors who had made it onto the network by interacting with a false system. In this way, honeypots could gather intelligence on and assess the behavior of these malicious actors. They were not created for threat detection.…

5 Ways Web Attacks Will Change Post-COVID

COVID-19 has accelerated changes in the way attackers hit web applications. Based on behaviors we observed during our research, we developed five predictions on how web application security will change as we come out of the COVID-19 period – and what security pros can do about it. 1. More sophisticated account takeover (ATO) attacks. The…

5 Ways vCISOs Move the Security Needle

Data has become more valuable than ever and organizations must make protecting it a top priority. According to IBM and the Ponemon Institute, the average data breach now costs American companies $8.19 million. On top of that, the recently-released Verizon Data Breach Investigations Report found that 86 percent of all breaches were financially-motivated.  As attacks…

Inside the Dark Web: 4 Misconceptions and How Security Teams Can Change Minds and Benefit

While the dark web offers a haven for criminals and serves as inspiration for Hollywood blockbusters, it’s much more mundane in real life. Still, many businesses feed into the fallacies surrounding the dark side of the Internet, ultimately delaying their ability to protect employees and consumers. Our industry really needs to shed some light on…

Only a Public-Private Partnership Can Secure the Electric Grid

President Trump recently issued an Executive Order to bar the purchase of certain critical electrical grid components from foreign adversaries. This order—like a similar telecommunications order released last year—reflects an acknowledgment by the federal government of a longstanding cyber threat to the electric grid posed by compromised equipment.  As with other threats to our critical…

Next post in Executive Insight