Feature | SC Media

Feature

SC Media’s 30th anniversary Q&A with Digital Shadow’s Becky Pinkard

As SC Media celebrates its 30th anniversary, we asked industry standout Becky Pinkard, vice president of Intelligence and IT at Digital Shadow to look back on her 30-plus years in the industry. How long have you been in security?  Since 1996 How has your discipline changed over the years?  It’s become visible and more open –…

Taxpayers stand strong against paying ransoms

Paying a ransom to regain access to a city’s data and systems has become increasingly common over the last few months. However, one study shows that most taxpayers are not happy when their elected officials give in to an attacker’s demand. Sixty percent of taxpayers said they are against giving in to the ransom demanded…

'Havex' malware strikes industrial sector via watering hole attacks

Second Triton/Trisis critical infrastructure attack spotted

A second attack against a critical infrastructure target has been launched using the Triton/Trisis custom attack framework. FireEye researchers were able to attribute a second attack to the Russian group it fingered as being behind the initial 2017 attack that hit a petrochemical plant in Saudi Arabia through its industrial control system. Although details such…

Bullish on cybercrime

As the U.S. economy takes investors on a wild ride, turning all the usual indicators topsy-turvy and sparking concern that the bear will usurp the bull, one market seems to be on a perpetual upswing — cybercrime. Threat intelligence researchers agree that adversaries are well connected in the sophisticated virtual labyrinths of the dark web,…

With AI, promises still outpace reality

AI’s value on the endpoint still a work in progress, but it’s improving AI is great for solving yesterday’s endpoint attacks, but the jury is still out on solving tomorrow’s. Esther Shein explains. Today it is almost impossible to talk about cybersecurity without someone turning the discussion to artificial intelligence (AI). Sometimes it is appropriate,…

Hacking for the holidays: Healthcare Ransomware Edition

Here’s how the healthcare industry can protect itself during the busy holiday hacking season The healthcare ransomware conundrum When ransomware hits a hospital, lives are on the line. Ed Tittel looks at how to deal with cyberattacks when lives are at stake The medical services industry is in a uniquely vulnerable position when it comes…

Forging an email security plan – The dark side of The Octopus’ garden

Before the phish gets its way, it is essential to have email security down pat. Lee Sustar looks at how tech and face-to-face education improve your defenses. Users in large organizations are firewalled, proxied, scanned, logged and analyzed, around the clock and worldwide. Companies find all kinds of ways to protect their email, but still,…