There is a tremendous amount of potential for machine learning and cyber security within the enterprise. In order for machine learning to live up to the hype, it will need to offer a fully robust security solution and plenty of organizations are now betting that machines will be up to the task.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
The Unique Identification Authority of India (UIDAI) has denied reports that the Aadhaar data breach has made masses of biometric data available to external players for a miniscule sum. Has big government in India simply overreached itself as far as its vision for this database is concerned?
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.
Innovative healthcare technology solutions are raising serious security and privacy concerns. And that has to be addressed. It needs to start with patient advocacy and transparency. And stricter regulations that can be tested by the patients.
Recent study by Imperva gets under the skin of what can now be characterized as an increasingly complex and rapidly maturing phishing industry. The study examined more than 1,000 free phishing kits that allow for the development of phishing web sites in what has been called an ‘easy to deploy’ format.
For years, China has used the World Internet Conference to advance its vision for cyber sovereignty. Now it looks like the various ideas and concepts, including the new Cybersecurity Law, undergirding this vision are starting to be put into effect for China’s Internet, with unknown implications.
AIG releases new cyber risk benchmarking model to quantify and score cyber maturity of clients, boosting cyber insurance and promoting metrics useful for the industry to evaluate the risks that organizations face in terms of cyber security.
In Part I, I left you with a teaser about how a home moving dilemma is the state of the enterprise today for cloud migration. Let’s now dig into the challenges that CIOs and CSOs are facing today in their journey to the Hybrid Cloud.
It’s not all about the safeguards and technical measures around information. Savvy security experts need to understand privacy and how it interacts with the security world and what privacy means for an organization’s security strategy and compliance with things like HIPAA, GDPR, CBPR, etc.
Enterprise security will always face complex challenges. But by taking a holistic approach to incident resolution, SOC leaders can leverage the right personnel and speed major incident resolution. Collaboration across teams can increase efficiencies and optimize their collective incident response today and tomorrow.