Expert Blogs and Opinion

Cybersecurity Reboots Networking

Cybersecurity Reboots Networking

Software-defined networks (a.k.a security-defined networks or SDN2), combines networking and security technologies to dramatically improve traffic monitoring, analysis and response throughout networks and across technology platforms. At the same time, SDN2 could save global enterprises $17B a year in reduced security breaches. Most IT security solutions today take advantage of Moore's Law—that...

Strategise, Prioritize, Automate and Utilizing Cloud to Improve Patching

Strategise, Prioritize, Automate and Utilizing Cloud to Improve Patching

How should organizations address the need to keep software up to date with security patches without it costing too much or being too labor intensive? In general, large organizations tend to take a risk-averse approach to patching and testing, sometimes erring so far on the side of caution that it is difficult to streamline the process. To address this, organizations need a patching strategy that...

Handling Cybercrime as a Disease

Handling Cybercrime as a Disease

One of the most remarkable facts about the human body—indeed, about the great mass of living things is that nearly every cell carries the complete genetic blueprint for the entire organism. Storing the same cache of knowledge in each cell, naturally, makes the human machine all the more efficient and adaptive. But there’s a dark side too: The wrong set of changes to a single cell’s genetic...

What’s Old Can Be New Again to a Cybercriminal

What’s Old Can Be New Again to a Cybercriminal

Older systems are ignored, no longer considered exploitable due to their age. Vulnerabilities sit on them for years, creating ample opportunity for a cybercriminal to attack. Meanwhile, vulnerability and IT teams do not communicate, assuming one or the other is taking certain actions to minimize exposures. Financial companies are no stranger to this issue, and for them the pressure to remediate...

Cyber Attacks: A Challenge for Economic Policies

Cyber Attacks: A Challenge for Economic Policies

Cyber risk is now being understood as a threat from the macroeconomic point of view also. Not only is digitalization spreading fast, but by its very nature it deepens the level of interconnectedness within the economy. Hence, the impact of cyber attacks goes beyond damage caused to individual victims. A widespread perception of cyber insecurity could slow the pace of technology adoption and trade...

  • More at Vox
  • |
  • |
KPMG: From Tech to CEO Business Issue, Cybersecurity at a ‘Tipping Point’

KPMG: From Tech to CEO Business Issue, Cybersecurity at a ‘Tipping Point’

KPMG recently released 2017 CEO Outlook Study of 400 US chief executives, which offers a roadmap of the 3-year outlook of CEOs across the country. Take a dive into the report’s cybersecurity section and you’ll find an interesting statistic: 76% percent of US CEOs see investment in cybersecurity as an opportunity to innovate and find new revenue streams. It was found that consumers would be...

Promises and Perils of Cybersecurity

Promises and Perils of Cybersecurity

Several countries are evaluating additional cybersecurity legislation and initiatives in an attempt to protect critical infrastructure and make industries more accountable for strengthening security controls. Companies should remain observant of ongoing changes in the laws of countries that they operate in. The growing number of intelligent connected industrial and consumer devices has created...

Are New Security Specialists Beginning Career at a Disadvantage?

Are New Security Specialists Beginning Career at a Disadvantage?

Two decades ago security was an all-encompassing term. Now, people seeking to enter the field are forced to choose their niche, sometimes before they even understand what it means. Sanjay Raja, the Chief Marketing Officer of Lumeta explains why this puts newcomers at a disadvantage. The traditional career route of yesterday gave veteran security pros a holistic understanding of security...

  • More at CSO
  • |
  • |
Is Patching Windows XP a Mistake?

Is Patching Windows XP a Mistake?

Last week, Microsoft issued a security patch for Windows XP, a 16-year-old operating system that Microsoft officially no longer supports. Last month, Microsoft issued a Windows XP patch for the vulnerability used in WannaCry. The zero-day flaw and its exploitation is unfortunate. The company had 3 ways it could respond. It could have done nothing. It could have extended Windows XP's support life...

How to Make the Cybersecurity Profession Agile?

How to Make the Cybersecurity Profession Agile?

Two of the most pressing cybersecurity tasks of our time are the need to dramatically grow the size of the workforce, and to create one that is agile enough to keep up with the shifting sands of today’s business landscape. An agile cybersecurity team cannot have fixed, traditional role boundaries. Having fluid job roles allows cybersecurity professionals the ability to learn new skills and...

Cyber Team Dynamics

Cyber Team Dynamics

A high performing, elite cyber defense team needs to have representation across the technical personalities. They need ‘multi-taskers’ who can visualize the network and manage the various sensors and tools to aggregate the logs from the firewalls, Active Directory, Network Security Monitoring systems and host-event data. A detail oriented ‘perfectionist’ who can pore through and...

Combining Public and Private Forces on the Front Lines of Cybersecurity

Combining Public and Private Forces on the Front Lines of Cybersecurity

Few security challenges muddle the distinction between government and business roles as those emanating from cyberspace. National security issues no longer remain solely under the purview of government agencies, and companies continue to find themselves in the sights of foreign adversaries. Information sharing between government and the businesses at the frontline of the virtual battlefield has...

Cyber-Threats Call for a New Secure Browsing Solution

Cyber-Threats Call for a New Secure Browsing Solution

Internet-borne threats such as ransomware and other malware are wreaking havoc on enterprises, large and small. As organizations further integrate the web to run front- and back-office operations, the reliance on browser-based and mobile applications only amplifies security risk. Today’s security technologies offer a patchwork of applications and systems such as proxies, filtering, and blocking...

Compliance and Security: In Search of Equilibrium

Compliance and Security: In Search of Equilibrium

Although compliance and security are not the same thing, they can coexist to create an equilibrium that allows organizations to fulfill both mandates and become strong stewards of proprietary and client data. To create this balance, companies need a holistic security strategy that prioritizes compliance as a component of the bigger picture. Compliance is a self-reflexive process designed to...

How Damaging Can the Effects of Cyber Crime Be?

How Damaging Can the Effects of Cyber Crime Be?

If a network has been compromised once, it can be again and although no organization can be 100% risk-free, measures (antivirus, firewall) should be taken to reduce the threat. For SME’s and smaller organizations, the immediate threat to systems may be less. However, if data is lost to attacks, the effects could be more damaging, and having to pay a ransom, or even a fine will be relatively...

Cybersecurity: Fact vs. Fiction

Cybersecurity: Fact vs. Fiction

Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks? Today's security industry is plagued with misinformation and FUD. 1) Is my car secure? There's more fiction than fact when it comes to car hacking. Remote car takeover hacks usually target either the entertainment system or the...

Read the latest cyber security and awareness blogs and articles by the leading experts

This category provides expertly curated news on the various blogs written by and the opinions expressed by the Who’s who in the domain of cybersecurity. The experts pen down their views on the contemporary issues every now and then. It is extremely beneficial for any person with keen interest in cybersecurity to read about the ideas, opinions and analysis of various cyber security issues by the experts. All the top-rated cyber awareness blogs are covered in this category and the pieces that represent the gem of the ideas are presented to our readers daily. This is a one stop point for all security enthusiasts to find cyber security blogs.