720-891-1663

Homeland Security Warns of Enterprise Systems Hacking

Enterprise Resource Planning (ERP) systems are quickly becoming a popular target of hackers.  It used to be that these systems were on private networks behind firewalls, but as companies move to the cloud and include their vendors and subcontractors in their ERP systems, the systems are becoming more public. More public means easier to hack. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Secure Software Development Lifecycle Process Still Lacking

In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells.  Backdoors are unauthorized ways to get into these systems in a way that bypasses security.  Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Complying with GDPR and California’s CCPA – Step 2

Last week I started a series on steps to comply with both the E.U.’s General Data Protection Regulation or GDPR and California’s new privacy law, the California Consumer Protection Act or CCPA.  To find Step 1, go to this post: https://cybercecurity-mitch-tanenbaum-blog.com/complying-with-gdpr-and-californias-new-privacy-law-ccpa-step-1/  . This week, on to Step 2 – CREATE A VENDOR CYBER RISK MANAGEMENT PROGRAM […]

Continue reading → [DISPLAY_ACURAX_ICONS]