Category Archives: Security strategy

Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

Despite increased perceptions about the value of cyber threat intelligence, many businesses and industries still struggle to define what it actually means to them: which capabilities to incorporate, and how to do the ground level planning necessary to support the telemetry and technological tools they put in place.

The post Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs appeared first on SC Media.

Continue reading

Posted in Network Security, Security News, Security strategy, Threat intelligence | Comments Off on Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

As SolarWinds spooks tech firms into rechecking code, some won’t like what they find

If more attacks are uncovered, end-user organizations must apply lessons learned from SolarWinds and take decisive action.

The post As SolarWinds spooks tech firms into rechecking code, some won’t like what they find appeared first on SC Media.

Continue reading

Posted in Application Security, Featured, Network Security, Security News, Security strategy | Comments Off on As SolarWinds spooks tech firms into rechecking code, some won’t like what they find

Does SolarWinds change the rules in offensive cyber? Experts say no, but offer alternatives

While tempting, most experts agree that hack-back strategies are a bad idea for companies. But there are tactics that can help deter nation-state actors and limit their ability to penetrate networks.

The post Does SolarWinds change the rules in offensive cyber? Experts say no, but offer alternatives appeared first on SC Media.

Continue reading

Posted in APT, APTs/cyberespionage, Cyberespionage, Featured, Security News, Security strategy, SolarWinds hack | Comments Off on Does SolarWinds change the rules in offensive cyber? Experts say no, but offer alternatives

New cyber council tackles infosec challenges from a tech perspective

Cybercrime is a plague on all industries, but a technology-borne problem at its core. So it makes sense that leading IT experts and infosec solution providers would step up to provide key advice to the tech community on how to protect customers from prevalent cyberthreats. To that end, the nonprofit IT trade association CompTIA this month officially…

The post New cyber council tackles infosec challenges from a tech perspective appeared first on SC Media.

Continue reading

Posted in Compliance, Network Security, Security awareness, Security News, Security strategy, Women in IT Security | Comments Off on New cyber council tackles infosec challenges from a tech perspective

With all eyes on the inauguration, lessons in the convergence of physical and digital security emerge

Washington, D.C. is on high alert, extending a special designation for security that always applies to inaugurations to Jan. 21, and calling in the National Guard. But in the wake of the attack on the Capitol, protection of digital assets is paramount.

The post With all eyes on the inauguration, lessons in the convergence of physical and digital security emerge appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Featured, Security News, Security strategy, Vulnerability Management | Comments Off on With all eyes on the inauguration, lessons in the convergence of physical and digital security emerge

2021 strategy predictions: Shifts in business models, shifts in security priorities

Enhanced email security? Growth of digital identities? Vulnerability management born from mergers and acquisitions? Here, cybersecurity experts offer their take on what strategic shifts we should expect within the enterprise.

The post 2021 strategy predictions: Shifts in business models, shifts in security priorities appeared first on SC Media.

Continue reading

Posted in Email Security, Featured, Phishing, Security News, Security strategy, Year in Review | Comments Off on 2021 strategy predictions: Shifts in business models, shifts in security priorities