It used to be that you stuck a key in a hole in your dashboard (and later in your steering column) and that was the end of the electronics. There were a few circuit boards, but mostly there were a lot of electro-mechanical linkages. Electronics sourcing says there are a thousand chips in a car […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Organizations manage risk. Risk has a lot of dimensions. Everything from not being able to get raw materials to hurricanes. Possibly your biggest risk is your third party relationships. As companies continue to outsource parts of their supply chain to other companies, those companies have your data. And if those companies get breached, you get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Office of Management and Budget released guidance for federal agencies AND CONTRACTORS, telling them what they need to do in order to comply with the executive order on cybersecurity. Of course, since this is the government, it took OMB more than a year to release this. This does have a big side benefit and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I’m not sure this secret weapon is legal. In fact, I am pretty sure that it is illegal. But, apparently, that isn’t stopping some lawyers and others from using it. I am not saying that everyone is a crook. They are not. But some, apparently, are perfectly willing to break the law. Carlo Pacileo was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers want data. The higher quality data, the happier the hackers are. Higher quality data can be sold for more money. Or use it for more hacking. Stolen credentials for the CEO are worth more than the password for the person who works on the loading dock. Old-timers will remember network hardware pioneer Nortel Networks. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First of all you have to figure out what an NFT is. Here is what Forbes says about it: An NFT is a digital asset that represents real-world objects like art, music, in-game items and videos. They are bought and sold online, frequently with cryptocurrency, and they are generally encoded with the same underlying software as […]
Continue reading →
[DISPLAY_ACURAX_ICONS]