720-891-1663

Security News for the Week Ending July 29, 2022

TSA Updates Cybersecurity Guidelines for Pipeline Operators After the Colonial Pipeline meltdown last year, TSA, who regulates pipeline cybersecurity (don’t ask), issued a set of regulations for pipeline operators to follow. Given that TSA had less than a dozen people in their cybersecurity department and zero industrial IoT expertise, it is not a surprise that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

So You THINK You Own Your Cryptocurrency

Voyager Digital is a cryptocurrency “bank”. It isn’t regulated like a bank, which a problem for users. The have debit cards and make loans. They trade crypto. Accept deposits. They also offered insane “rewards” (12%) so they could invest in the crypto space. In order to fuel these crazy payouts, they had to make risky […]

Continue reading → [DISPLAY_ACURAX_ICONS]

In the Wake of Breaches, Insurers Look to Rescind Policies

As loss payouts on cyber policies continue to increase, carriers are looking for ways to get out of paying. Since cyber insurance is a non-standard-form policy, you really have to read it carefully to understand whether you are complying. For example, in reviewing one client’s policy, we discovered that if the client did not perform […]

Continue reading → [DISPLAY_ACURAX_ICONS]

WHY is Huawei a Cybersecurity Risk?

Just call me dumb. For the last couple of years the feds have been claiming that Chinese equipment manufacturers like Huawei pose a national security risk to the United States. I really didn’t understand this since all the data transmitted over the cellular network is encrypted, so what is the problem. First, in theory, after […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending July 22, 2022

San Francisco Cops Want Real-Time Access to Private Security Cameras for Surveillance San Francisco lawmakers are considering a bill that would allow police to use private security cameras for real time surveillance. This bill expands a 2019 city ordinance that requires police to seek authorization before acquiring and deploying surveillance, hence this notice. While it […]

Continue reading → [DISPLAY_ACURAX_ICONS]