When insurance companies first started writing cyber risk insurance, it was unbelievably profitable. They were writing many policies and not processing many claims, so they were very happy. Over the last few years customers discovered that it did not make any sense to buy insurance and not make a claim when a bad event happened. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The UK Might Beat Us to Regulating MSPs In the US, anyone can become a managed service provider. Unfortunately, customers may think that comes with security, but usually it does not. The UK is about to create a legally binding cybersecurity framework for managed service providers. This may be the first step at forcing businesses […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This executive order is a big one – and very aggressive. Here is part 3 of what is in it. I am going to keep doing this until I get all the way through this almost 40 page document. In part 2, I provided the abridged version of section 4 of the EO. This is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Long before quantum computing becomes “main stream”, state actors will have access to it. In part, because they command large budgets; in part because it is important to them. Why do they care? Because, it will allow them to decrypt both communications that they intercept going forward and communications that they have intercepted in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About ten days ago Ireland’s healthcare system was forced to shut down its computers due to a ransomware attack. Ireland’s health minister said the attack was having a severe impact on the health and social services. In today’s healthcare world, having doctors and hospitals run without computers means no patient charts and a very labor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Teslas can be Hacked via a DRONE Without any Owner Interaction Researchers have shown how they can hack a Tesla from a done without the owner even being aware that he or she is being attacked and particularly, without the owner being involved in the takeover of the car. The attack, called TBONE, was reported […]
Continue reading →
[DISPLAY_ACURAX_ICONS]