Cybersecurity

 
 
  • A Primer On Cloud Security

    A blog post on the threat stack site provides some guidance on what some broad categories of cloud security solutions do and don’t offer, and how they deliver security information and alerts to their end users. Network...

    • Posted 4 days ago
    • 0
  • Senate Committee To Act On Cybersecurity

    Three cybersecurity bills will soon get votes before the Senate Homeland Security Committee. The most important one appears to be the DHS Cyber Hunt and Incident Response Teams Act. The bill requires the Dept. Of Homeland Security...

    • Posted 5 days ago
    • 0
  • Not Just a Security Team – a Security Champion

    They aren’t part of the data security team, but according to this article at the InfoSec site,, all companies have security champs. They just need to identified. They enrich their respective teams and departments with their information...

    • Posted 7 days ago
    • 0
  • Is It A Trade Spat Or The Start Of Another Cold War?

    It could well be the latter, according to Peter Hartcher, journalist and visiting fellow at the Lowy Institute, a Sydney-based foreign policy think tank. Writing in the Sydney Morning Herald, he quotes former U.S. Treasury Secretary Hank Paulson,...

    • Posted 7 days ago
    • 0
  • Impersonating The CEO: How A Phishing Attack Got Outed

    Their modus operandi followed what’s become a familiar pattern. The bogus email appeared to come from the CEO, and in this case it asked the recipients to send a return email with some gift card links. The...

    • Posted 1 week ago
    • 0
  • Using An “Adversary Mindset” To Detect Cyber-Risk

    Today’s security analyst, utilizing artificial intelligence, can detect anomalies in even the largest and most complex networks. The problem, says this post from eSentire, is to distinguish “the potentially malicious from the purely anomalous,” and unless that...

    • Posted 2 weeks ago
    • 0
  • Predictions About Cybersecurity Didn’t Come True In 2018

    Government actions worldwide to tighten cybersecurity, widely predicted, didn’t happen in 2018. The EU’s General Data Protection Regulation led to widespread forecasts that U.S. firms, used to playing fast and loose with individuals’ data, would get smacked...

    • Posted 2 weeks ago
    • 0
  • Will Your Insurance Cover An Email Scam?

    Business Email Compromise, or BEC, is a growing business for a few scammers and an increasingly common problem for businesses large and small. The latest iteration is said to involve an agile two-step, the first being a...

    • Posted 3 weeks ago
    • 0
  • Skeptical Courts Are Rejecting Privacy Class Actions

    Of four major cases where a court has addressed the question of class certification, it refused to certify the class in three of them. “The theme of decisions denying class certification is that causation and damages in...

    • Posted 3 weeks ago
    • 0
  • The Day Before Day One

    Zero-day cyberattacks are attacks that occur on day zero, before a computer or a security system has been updated to prevent it. There are three general ways to define zero-day threats: Zero-day attacks occur when a third-party...

    • Posted 3 weeks ago
    • 0