TSA Updates Cybersecurity Guidelines for Pipeline Operators After the Colonial Pipeline meltdown last year, TSA, who regulates pipeline cybersecurity (don’t ask), issued a set of regulations for pipeline operators to follow. Given that TSA had less than a dozen people in their cybersecurity department and zero industrial IoT expertise, it is not a surprise that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Voyager Digital is a cryptocurrency “bank”. It isn’t regulated like a bank, which a problem for users. The have debit cards and make loans. They trade crypto. Accept deposits. They also offered insane “rewards” (12%) so they could invest in the crypto space. In order to fuel these crazy payouts, they had to make risky […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As loss payouts on cyber policies continue to increase, carriers are looking for ways to get out of paying. Since cyber insurance is a non-standard-form policy, you really have to read it carefully to understand whether you are complying. For example, in reviewing one client’s policy, we discovered that if the client did not perform […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just call me dumb. For the last couple of years the feds have been claiming that Chinese equipment manufacturers like Huawei pose a national security risk to the United States. I really didn’t understand this since all the data transmitted over the cellular network is encrypted, so what is the problem. First, in theory, after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
San Francisco Cops Want Real-Time Access to Private Security Cameras for Surveillance San Francisco lawmakers are considering a bill that would allow police to use private security cameras for real time surveillance. This bill expands a 2019 city ordinance that requires police to seek authorization before acquiring and deploying surveillance, hence this notice. While it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Let’s assume that you are interested in buying cybersecurity insurance. It is very likely that the underwriter is going to use one of the External Attack Surface Management tools (EASM) like the ones we sell to decide whether to write insurance for you. Your customers may also use an EASM tool to decide whether to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]