In the News

Top 20 Predictions Of How AI Is Going To Improve Cybersecurity In 2021

Forbes | December 5, 2020

Bottom Line: In 2021, cybersecurity vendors will accelerate AI and machine learning app development to combine human and machine insights so they can out-innovate attackers intent on escalating an AI-based arms race.

UK tech skills gap to reduce as more Brits consider IT jobs

IT Pro | 4 November 2020

The UK’s tech skills gap is set to decrease as over half of workers are contemplating a career change into more tech-based roles, new research suggests.

A survey of over 2,000 professionals from CWJobs found that over half (55%) of non-tech workers are contemplating a career change.

What You Need to Know About CMMC Certification

Supply Chain Brain | October 7, 2020

As the Cybersecurity Maturity Model Certification (CMMC) nears full implementation, affected organizations are scurrying to ensure they’ll pass the certification process.

The goal is simple: organizations must meet minimum cybersecurity standards, and in doing so, they do their part to improve national security. The stakes are extraordinarily high for the estimated 300,000 defense industrial base (DIB) organizations which will soon need to be certified to one of the five CMMC levels to be eligible to be awarded a federal contract. Simply stated: no certification, no contract. From the perspective of the U.S. Government and the Department of Defense, the stakes have always been high since the DIB plays such a critical role in the defense of our nation. The only way to ensure the protection of our data and the integrity of the supply chain is to hold industry to a higher standard.

The Role of Cyber Hygiene in the COVID Crisis

Signal Magazine | October 7, 2020

By Ray Rothrock
Federal teleworkers need to know the cyber basics.

When it comes to nefarious deeds, the COVID-19 pandemic has been a gold mine for bad actors. In addition to wreaking havoc for individuals and healthcare organizations, federal agencies are also prime targets. Case in point: a portion of the Department of Health and Human Services’ (HHS) website was recently compromised, in what appears to be a part of an online COVID-19 disinformation campaign.

In a time of heightened cyber risk and limited human and fiscal resources, how can agencies protect their networks from malicious actors by taking a page from the COVID playbook? They can diligently practice good (cyber) hygiene.

Pets vs cattle: How to get cloud and DevOps security right

ITProPortal | September 25, 2020

A look at security, both on-premise and in the cloud.

By Dr. Mike Lloyd

In a world as nebulous as cloud computing and DevOps, analogies can sometimes help us to think more clearly. The idea of “pets versus cattle” was first used nearly a decade ago to help delineate the difference between traditional on-premises IT and the cloud, and has become a firm favorite in the DevOps community ever since. But there are also lessons here for cybersecurity teams, as long as they’re able to see through the limits of the analogy and understand where the main challenges are.

Julie Parrish of RedSeal: “There is an awful lot that will happen outside of your control; how you react is crucial”

Authority Magazine | September 10, 2020

As a part of our series about strong women leaders, I had the pleasure of interviewing Julie Parrish.

Deepfakes and deep fraud: The new security challenge of misinformation and impersonation

IDG Connect | September 1, 2020

Deepfakes, until recently, have just been an amusing part of the internet. Videos emerged of various celebrities in the wrong movie or interview, some were quite poorly made but others were almost like the real thing. They were entertaining and funny; not really given much thought and left to a corner of the internet. However, it was not long before politicians were the next target, videos emerging of significant figures like Barack Obama, Nancy Pelosi and Donald Trump.

It was at this point that some serious concerns started to develop over the security implications of this technology.

Don’t believe the hype: AI is no silver bullet

Computer Weekly | August 7, 2020

We want to believe AI will revolutionise cyber security, and we’re not necessarily wrong, but it’s time for a reality check

Chief information security officers (CISOs) looking for new security partners must therefore be pragmatic when assessing what’s out there. AI is helpful, in limited use cases, to take the strain off stretched security teams, but its algorithms still have great difficulty recognising unknown attacks. It’s time for a reality check.

Podcast | Cybersecurity in the Pandemic: How Can We Protect Ourselves?

Supply Chain Brain | July 31, 2020

Far from slowing down cyber thieves, the coronavirus pandemic presents them with ever greater opportunities to hack into networks. You don’t have to be a cynic to expect cyber thieves to take advantage of a global health crisis. From their perspective, the time is ideal. In the confusion surrounding the lockdown, companies might indeed be letting down their guard. And employees working from home present a whole new range of possible network vulnerabilities.

On this episode, we learn about the heightened risk of cyber crime from an expert in the field: Ray Rothrock, executive chairman of RedSeal, a cyber terrain mapping company. He offers valuable advice on shoring up networks in this critical time, and explains what it means to operate in a “zero trust” environment.

3 Ways Social Distancing Can Strengthen your Network

Dark Reading | July 31, 2020

Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here’s how.

We all know the role social distancing plays in combating COVID-19. Most people also understand why this is our primary line of defense; it’s about slowing down the progress of the disease to prevent our healthcare defenders from being overwhelmed. Today’s network security teams live in a similar shifting landscape and need to apply these same ideas to avoid getting overwhelmed. Here are three tactics to help “social distance” your network.

Tactic 1: Focus on Flare-ups