Courts can’t quite figure out how to treat Internet companies. Amazon is an interesting mix. It sells some products itself, it offers other products that are sold and fulfilled by third parties and it does a mix (products sold by third parties but fulfilled by Amazon). I hope Amazon is hiring a lot of lawyers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Zelle is a peer to peer payment network similar to Venmo and others. The difference is that Zelle is owned by the big banks like Bank of America, Capital One, Chase, Wells Fargo and others. But recently Zelle has been in the news and not for good reasons. Scammers have figured out that they can […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Tomorrow is the one-year anniversary of the Colonial Pipeline attack. The government has done more to improve cybersecurity in the last year than it had done in the last 10 years. But there is still a lot more to do. Jury Finds Norton/Lifelock Infringed on Two Columbia University Patents Even in the world of cybersecurity, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here is another short read for you (sorry). For those who read this blog on a regular basis, you know that we talk about supply chain risk a lot. Formally, the government calls it Cybersecurity Supply Chain Risk Management or C-SCRM. Supply chain attacks are very popular because if you pull one off (think SolarWinds), […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As we watch hackers compromise systems of both large and small companies in every country every day, it kind of points out the obvious – whatever security program companies that develop software have in place are not adequate to the threat. Up until now, software companies have not suffered because their license agreements say that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You may have heard that Russians with cyber expertise have been leaving the country by the tens of thousands. That represents a big problem for the Kremlin. Russian companies, no different than U.S. companies, need cyber talent to operate their businesses. In addition, especially now, they need cybersecurity talent to protect their businesses – and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]