The California Privacy Protection Agency, the government agency that enforces the California Privacy Rights Act, has released two DRAFT documents recently. They are going to discuss the drafts at their meeting tomorrow but they have not yet started the rulemaking process. The two regulations are the cybersecurity audit regulations and the cyber risk assessment regulations. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
That question is the basis of a FIVE BILLION DOLLAR lawsuit. Google’s Chrome incognito mode is the tool of choice for people who want to keep their web activity private. The use of it is often called private browsing or porn mode, depending on who you talk to. There are legitimate reasons to use incognito […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What Does $50,000 in iPads Get You? The answer may be a prison sentence for bribery. The case is going back and forth, but now the case is back on. The head of Apple security wanted some concealed carry permits for his team and since the process wasn’t going as fast as Apple would like, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Web scraping is a time honored tradition. Everyone does it. Just not at the scale that companies like Google, Facebook and Microsoft do it. Some people say that data is the new oil. If true, that means if you have more data than the other team, you will win. AI for example, needs to train […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Warns Other Countries Hack Satellites Like We Do Last week I wrote about US Space Force bragging that they set up a new team to hack adversaries satellites and ground infrastructure. This week the Air Force and NCSC published an advisory that, guess what, other countries are doing the same thing and if the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Chair of the House Oversight Committee’s cybersecurity subpanel says the bill, titled the Federal Cybersecurity Vulnerability Reduction Act, would play a crucial role in protection the nation’s digital infrastructure. The bill doesn’t actually require federal contractors to improve security. Instead, it will require all federal contractors, potentially even 1 person companies, to set up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]