While this EO and almost all EOs only affect what executive branch agencies do, it is likely that it will have a big effect on cybersecurity in general. Here are some requirements: The government uses a lot of commercial cloud software. Current contract terms may limit what data a cloud provider is allowed to share […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If You Thought the FTC Was Toothless Before, Just Wait I always complained that the FTC’s penalties were way too meek. Now I understand why, but it has just gotten MUCH worse. 99.99% of the blame goes to Congress. Initially, the FTC could not bring lawsuits against businesses at all. All they could do was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is interesting that this attack has captured the attention of consumers and government alike. For those of you not affected, the Colonial Pipeline company runs the major pipeline for refined petroleum products between Houston and New Jersey with many stops in between. The pipeline covers 5,500 millions and moves 100 million gallons of fuel […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Facebook Says: Give Us Your Data or Pay For Facebook That is a slight paraphrase, but not much. In light of Apple’s new requirement to ask users for their permission to steal their data, Facebook and others are mounting a full assault on their users. First of all, Facebook grossed $26 billion in the first […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ever see a scene in the movies where the cops (or the bad guys) plant a tracking device on someone and later catch the person doing something? Ever hear stories about an ex stalking his or her former partner? Well Apple just made that ‘affordable’. Probably too affordable. And folks have already tested it. Like […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The most famous supply chain attack of the last few years was the SolarWinds attack. That attack was a home run for the Russians. Other hackers (or maybe the same ones) thought that was a great attack vector. Now it seems to have become quite popular. Then came DevOps tool provider Codecov. Hackers compromised Codecov, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]