The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mergers and acquisitions are a time to tread carefully. While all M&A teams review financials, sales projections, key personnel, etc., it is much less likely that the review includes examining the code base being acquired for vulnerabilities. That is probably not a good decision. Synopsys sells a service to review software during mergers and acquisitions […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many companies allow employees to use their own personal computers for work. They do this for employee convenience and an apparent cost savings. After all, if we don’t have to buy employees their own laptop, certainly we will save money. At least it seems like that is true. In a perfect world, with no hackers, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
European Governments Want to be Able to Snoop on ALL of Our Communications As is usually the case, their excuse it that “it is to protect the children”. They want to break encryption while sprinkling magic fairy dust to not break encryption (an impossibility) in an effort to force kiddie porn traders (now called child […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Every now and then researchers or hackers discover a new class of bugs that spells trouble for a vendor. Apple is no exception. For a long time, when no one really cared about Apple, it looked like they were bulletproof. Not any more. This new bug, if exploited, could let a hacker to steal your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I’ve never been a fan of GoDaddy for a variety of reasons, but now I have a major reason not to like them. In 2020 GoDaddy alerted 28,000 customers that an attacker used their credentials in 2019 to abuse their hosting accounts. That is over 3 years ago and that was the start of a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]