720-891-1663

Secure Software Development Lifecycle Process Still Lacking

In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells.  Backdoors are unauthorized ways to get into these systems in a way that bypasses security.  Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Complying with GDPR and California’s CCPA – Step 2

Last week I started a series on steps to comply with both the E.U.’s General Data Protection Regulation or GDPR and California’s new privacy law, the California Consumer Protection Act or CCPA.  To find Step 1, go to this post: https://cybercecurity-mitch-tanenbaum-blog.com/complying-with-gdpr-and-californias-new-privacy-law-ccpa-step-1/  . This week, on to Step 2 – CREATE A VENDOR CYBER RISK MANAGEMENT PROGRAM […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Sextortionists Shift Scare Tactics

Sextortion is the act of convincing vulnerable people, often teenagers, to provide the sextortionist with sexually explicit photographs and videos under the threat of releasing other embarrassing material, such nude pictures that may already privately exist in the victim’s email, text messages or private social media. The attacker does this by convincing the victim that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Third Party (Vendor) Cyber Risk Management Rears its Ugly Head AGAIN!

This seems to be a recurring topic, but it doesn’t seem to be getting any better, so I will leap back into the fray. Last month Ticketmaster announced they had a breach and they led people to believe that it was isolated and that it had something to do with their software. According to RiskIQ, […]

Continue reading → [DISPLAY_ACURAX_ICONS]