For those of in the cybersecurity industry this is not a big surprise. MxD is recognized as the National Center for Cybersecurity in Manufacturing by the Department of Defense and they conducted some interesting research. They conducted a survey of 750 manufacturing firms in several industries, including both big and small companies. Here is a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unfortunately, this may be the only way to get some businesses to improve their cybersecurity practices. Hew York is using its regulation of financial services firms as a model to regulate the security of its 152 “General” hospitals. Those are hospitals that “provide medical or medical and surgical services primarily to in-patients by or under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the biggest uses of the Internet is to sell sex. Whether it is chat rooms, pictures of naked people, whatever, it is a big money maker on the Internet. The hottest subject in town these days, even hotter than crypto, is AI. So what are Russian hackers doing? They are combining sex and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Passwords. Everyone loves passwords, right? Lets have a big round of applause for complex passwords. No? You are not a fan of those crazy passwords like &*(Y45(*]}mMh@+. Me either. NIST sets the rules for the federal government and has a big influence on private industry. They have what they call a special publication or SP […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We already know that water plants (another one in Kansas was attacked this week), power and healthcare are under constant attack. The industries and the government are paying attention to these with some limited success, but at least it is on everyone’s radar. One sector that has tried to stay out of the spotlight but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I know I sound like a broken record, but as businesses start to improve their internal security, attackers focus on compromising businesses’ supply chains. In the case of the Hezbollah attack, the attackers must have, some how, known (a) that they were buying new walkie-talkies and pagers, (b) who they were buying them from, (c) […]
Continue reading →
[DISPLAY_ACURAX_ICONS]