Cybersecurity

 
 
  • Changing Views on Privacy

    A pronounced cultural shift in attitudes regarding privacy is making demands on both lawmakers and companies. For companies, one immediate effect is that boilerplate consent forms will no longer be sufficient. In the legislative arena, there is...

    • Posted 4 weeks ago
    • 0
  • Shutdown Increasing The Risk Of A Major Cyber Attack

    A spokesman for the Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security, says that officials have now “ceased a variety of critical cybersecurity and infrastructure protection capabilities.” The spokesman, in an email exchange...

    • Posted 4 weeks ago
    • 0
  • 9-11 Insurance Hack Breaks New Ground In Cyber-Extortion

    By successfully breaching a law firm retained by global insurer Hiscox, a group known as The Dark Overlord has obtained a trove of litigation documents related to the 9-11 attack. “The news gives insight into how hacking...

    • Posted 1 month ago
    • 0
  • States Beginning to Legislate Cybersecurity

    Ohio has become the first state to legislate incentives for corporate entities to develop and implement effective data privacy and cybersecurity procedures. As of November 1, 2018, an organization can claim an affirmative defense to a lawsuit...

    • Posted 1 month ago
    • 0
  • Cyber Attack From “State Actor” Was Just A High-Tech Heist

    It safe to say 99 percent of readers won’t follow the technical details of this post, but it’s still worth reading for someone who wants to get a feel for the kinds of threats companies are having...

    • Posted 1 month ago
    • 0
  • NASA Plagued By Security Breaches

    Its own Office of Inspector General (OIG) has been critical of IT management and cybersecurity at NASA for years, and now a cyberattack may have compromised personally identifiable information about NASA personnel, including their Social Security numbers....

    • Posted 1 month ago
    • 0
  • You’re the Quarterback, and Here Come the Bears

    He’s polymorphic and he can spread laterally – those are two key qualities shared by Khalil Mack, the Chicago Bears’ fearsome pass rusher, and the most threatening cyber criminals. If you were the San Francisco 49ers this...

    • Posted 1 month ago
    • 0
  • Securing Your Cloud Workload

    It’s imperative that businesses ensure the security of their cloud workloads. There is a common misconception that this is the responsibility of the cloud service provider, but if you work with an “infrastructure as a service” such...

    • Posted 2 months ago
    • 0
  • Cyber Threat Predictions For 2019

    Machine learning and AI will generate useful new products and services, change the way we communicate and exchange information, and bring many other changes, most of them we are told arguably for the better. But this compendium...

    • Posted 2 months ago
    • 0
  • Aerospace Association Trying To Soften Cybersecurity Standards

    A trade association that lobbies Congress on behalf of defense contractors has released a list of voluntary standards designed to help aerospace companies keep weapons systems secure from hackers. According to a prominent cybersecurity consultant, the framework...

    • Posted 2 months ago
    • 0