All classes available with Virtual Classroom Live! Learn More

Tag Archives: technology lag

Cybersecurity: Increasing Regulation

A final aspect of the cybersecurity landscape that is worthy of attention isn’t strictly technology related but instead relates to regulation and legislation. For many years the information technology industry was left to its own devices when it came to how much energy they put into protecting information systems infrastructure. Unfortunately, the industry hasn’t been […]

Tagged , , , , , , , , , , |

Cybersecurity: Transition to the Cloud

The cybersecurity landscape has been substantially altered by organizations moving on-premise workloads to the cloud. Important to note though is that moving infrastructure, applications, and data to the cloud doesn’t mean that the responsibility for information security shifts from organizational personnel to the cloud provider. As has been amply demonstrated by developers leaving cloud storage […]

Tagged , , , , , , , , , , |

Cybersecurity: IoT

Another big change in the cybersecurity landscape over the past decade has been the rise of the Internet of Things (IoT). The IoT is the network of physical objects, devices, televisions, refrigerators, home climate systems, cars, and other items, that are increasingly embedded with electronics, software, sensors and network connectivity that enables these objects to […]

Tagged , , , , , , , , , , |

Cybersecurity: Automation of Detection

One aspect of the cybersecurity landscape that has become brighter for defenders is that it has become easier to detect attacks that would have otherwise only been apparent through expert analysis of information system’s event log telemetry. While some attackers are overt and do little to hide their presence on the network, competent attackers often […]

Tagged , , , , , , , , , , |

Cybersecurity: Monetization of Malware

A big change in the recent cybersecurity landscape is coin mining software. Coin minding software is software that mines cryptocurrency, such as Monero, Bitcoin, or Ethereum. This is a big change because in the past it was difficult for an attacker to monetize an intrusion. Coin mining software makes monetizing intrusions straightforward. An attacker who […]

Tagged , , , , , , , , , , |

Cybersecurity: Attack Tools Availability and Sophistication

An adage within the cybersecurity industry is that tools that are only available to the elite hacking teams of nation-state intelligence agencies today will be available to teenage script kiddies within five years. “Script Kiddie” is a derisive term to describe an individual who uses sophisticated scripts and applications developed by experts to attack information […]

Tagged , , , , , , , , , , |

Cybersecurity: Skills Gap

It’s regularly reported that the field of information security doesn’t have enough trained personnel to meet industry needs. The recent Global Information and Security Workforce Study by the Center for Cyber Safety and Education projected a global shortfall of 1.8 million information security workers by 2022. Organizations cannot begin to protect themselves from the various […]

Tagged , , , , , , , , , , |

Cybersecurity: Application Development Security

The adoption of secure application development practices is another important part of the cybersecurity landscape. Many application developers create applications that are subject to attacks including cross-site scripting (XSS) and SQL injection, even though these attack vectors have been known about and understood for many years. As applications move from being locally installed on computers […]

Tagged , , , , , , , , , , |

Cybersecurity: Technology Lag

When considering the cybersecurity landscape, it’s important to note that the versions of products that organizations have deployed exist on a spectrum, with a small number of organizations running the latest versions, most organizations running older but still supported versions, and a substantial number of organizations running information systems that are no longer supported by […]

Tagged , , , , , , , , , , |

Current Cybersecurity Landscape

The current cybersecurity landscape is complex. Attackers develop new and ingenious methods of compromising systems on a daily basis. Intrusion tools, originally developed by the intelligence agencies of nation states, have been leaked, reverse engineered, and then made available to anyone clever enough to know where to look for them. New credential breaches are published […]

Tagged , , , , , , , , , , |