Vendor risk must be a core part of every company’s cybersecurity program, but it is hard. Especially when the company is a tech company, developing software that you use. The term Minimum Viable Product or MVP is a term marketing folks have used for years to describe creating a version 1 product that has the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is probably not a surprise to anyone who is past elementary school – and probably not to many who are still in elementary school, but the group that was behind last year’s SolarWinds attack is still at it. Just like with SolarWinds, they are going after the global supply chain. 140 managed service providers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
59% of cybersecurity executives at large and medium organizations say that they have LOST business due to product security concerns for connected and embedded devices. 45% say that customers want detailed information about what is in their devices, but only 11% of companies have high confidence that they can do that, even if they want […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Konstantin Gizdov has an interesting story to tell. He got locked out of his Microsoft Azure account. He doesn’t think it was hacked, it was a Microsoft software bug. More importantly, his attempts to recover the account were incredibly frustrating. The frustration was, in part, caused by the fact that Microsoft didn’t think it was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Historically, attorney-client privilege was used to protect conversations between attorneys and their client as they were preparing their defense. While that is still the case, there is a lot of information that companies that were breached might not want to get out to the folks suing them. If it is not done right, it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you use multi-factor authentication? Google says that less than 10 percent of its users use MFA. They were concerned that if they made people use MFA they would leave. Not sure what they would leave to? Who else offers as compelling a suite of software. For free. Or at least just for stealing all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]