• A Primer On Cloud Security

    A blog post on the threat stack site provides some guidance on what some broad categories of cloud security solutions do and don’t offer, and how they deliver security information and alerts to their end users. Network...

    • Posted 4 days ago
    • 0
  • Ransomware Attacks Hit Legal System

    The tools to carry out this scam are a cheap commodity, and it’s become a plague. Using software that’s available on the internet, cyber-extortionists are said to have mounted 100,000 attacks a day in 2018, a rate...

    • Posted 4 days ago
    • 0
  • Senate Committee To Act On Cybersecurity

    Three cybersecurity bills will soon get votes before the Senate Homeland Security Committee. The most important one appears to be the DHS Cyber Hunt and Incident Response Teams Act. The bill requires the Dept. Of Homeland Security...

    • Posted 5 days ago
    • 0
  • Not Just a Security Team – a Security Champion

    They aren’t part of the data security team, but according to this article at the InfoSec site,, all companies have security champs. They just need to identified. They enrich their respective teams and departments with their information...

    • Posted 7 days ago
    • 0
  • Is It A Trade Spat Or The Start Of Another Cold War?

    It could well be the latter, according to Peter Hartcher, journalist and visiting fellow at the Lowy Institute, a Sydney-based foreign policy think tank. Writing in the Sydney Morning Herald, he quotes former U.S. Treasury Secretary Hank Paulson,...

    • Posted 7 days ago
    • 0
  • Impersonating The CEO: How A Phishing Attack Got Outed

    Their modus operandi followed what’s become a familiar pattern. The bogus email appeared to come from the CEO, and in this case it asked the recipients to send a return email with some gift card links. The...

    • Posted 1 week ago
    • 0
  • Using An “Adversary Mindset” To Detect Cyber-Risk

    Today’s security analyst, utilizing artificial intelligence, can detect anomalies in even the largest and most complex networks. The problem, says this post from eSentire, is to distinguish “the potentially malicious from the purely anomalous,” and unless that...

    • Posted 2 weeks ago
    • 0
  • Predictions About Cybersecurity Didn’t Come True In 2018

    Government actions worldwide to tighten cybersecurity, widely predicted, didn’t happen in 2018. The EU’s General Data Protection Regulation led to widespread forecasts that U.S. firms, used to playing fast and loose with individuals’ data, would get smacked...

    • Posted 2 weeks ago
    • 0
  • Will Your Insurance Cover An Email Scam?

    Business Email Compromise, or BEC, is a growing business for a few scammers and an increasingly common problem for businesses large and small. The latest iteration is said to involve an agile two-step, the first being a...

    • Posted 3 weeks ago
    • 0
  • Why To Avoid “WeChat” When Managing Chinese Employees

    It’s the most widely used messaging and social media app in China, and its many users now include employees and employers communicating with each other. That’s not a good idea for either side, at least not when...

    • Posted 3 weeks ago
    • 0