720-891-1663

Researchers Say Businesses Think Their Cybersecurity is Better Than it is

For those of in the cybersecurity industry this is not a big surprise. MxD is recognized as the National Center for Cybersecurity in Manufacturing by the Department of Defense and they conducted some interesting research. They conducted a survey of 750 manufacturing firms in several industries, including both big and small companies. Here is a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

NY Forces Hospitals to Improve Cybersecurity

Unfortunately, this may be the only way to get some businesses to improve their cybersecurity practices. Hew York is using its regulation of financial services firms as a model to regulate the security of its 152 “General” hospitals. Those are hospitals that  “provide medical or medical and surgical services primarily to in-patients by or under […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Russia Using AI and Sex to Lure Victims

One of the biggest uses of the Internet is to sell sex. Whether it is chat rooms, pictures of naked people, whatever, it is a big money maker on the Internet. The hottest subject in town these days, even hotter than crypto, is AI. So what are Russian hackers doing? They are combining sex and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

NIST Calls for New Password Rules

Passwords. Everyone loves passwords, right? Lets have a big round of applause for complex passwords. No? You are not a fan of those crazy passwords like &*(Y45(*]}mMh@+. Me either. NIST sets the rules for the federal government and has a big influence on private industry. They have what they call a special publication or SP […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Are Railroads the Next Infrastructure Attack?

We already know that water plants (another one in Kansas was attacked this week), power and healthcare are under constant attack. The industries and the government are paying attention to these with some limited success, but at least it is on everyone’s radar. One sector that has tried to stay out of the spotlight but […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Third Party Risk Management in Light of Hezbollah and Twilio Attacks

I know I sound like a broken record, but as businesses start to improve their internal security, attackers focus on compromising businesses’ supply chains. In the case of the Hezbollah attack, the attackers must have, some how, known (a) that they were buying new walkie-talkies and pagers, (b) who they were buying them from, (c) […]

Continue reading → [DISPLAY_ACURAX_ICONS]