720-891-1663

House Repubs Call For More Cyber Regulation of Federal Contractors

The Chair of the House Oversight Committee’s cybersecurity subpanel says the bill, titled the Federal Cybersecurity Vulnerability Reduction Act, would play a crucial role in protection the nation’s digital infrastructure. The bill doesn’t actually require federal contractors to improve security. Instead, it will require all federal contractors, potentially even 1 person companies, to set up […]

Continue reading → [DISPLAY_ACURAX_ICONS]

NIST Releases Draft 800-171 Rev 3

NIST Special Publication 800-171 is the guide that all defense contractors must follow for protecting controlled unclassified information. It has been around since 2015 and has gone over several revisions. Revision 3 is the most recent and NIST has released the “initial public draft”. Expect a final draft this fall and a released version in […]

Continue reading → [DISPLAY_ACURAX_ICONS]

You Know Those Badges That Open Doors – They are not Secure and Neither is the Replacement

Most of us have either used or seen others use that badges to unlock doors either at homes or offices. Most of these use a technology called Wiegand Wire. Compared to your average key, it is more secure and it does leave an audit trail, but the badges are easily cloned using devices available on […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending August 18, 2023

Colorado AG Sends out “Welcome Letters” About CO Privacy Law Colorado AG Phil Weiser has sent out letters to businesses reminding them of their responsibilities under the Colorado Privacy Law. Likely the next letter won’t be so welcoming. Credit: Truyo White House Will Host Roundtable on Harmful Data Broker Practices At the roundtable, the CFPB […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Selling Access to Multi-Billion Auction House

The hacker business is like any other business. There are specialists. In the hacking business, one of the specialties is initial access. Initial access brokers break in to businesses and “collect” credentials. They don’t use those credentials. That is a different specialty. Researchers say that they studied Russian language hacker forums for a few months […]

Continue reading → [DISPLAY_ACURAX_ICONS]