The Census Bureau admits that they were hit by a cyberattack last year while they were tallying the U.S. population, but not to worry – the servers compromised weren’t being used to conduct the tally. Trust them. According the the Inspector General, the Census Bureau missed multiple opportunities to stop the attack. How would you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Nick Merker, partner at Indianapolis based law firm Ice Miller, spoke at Black Hat on the subject. Nick has been involved in over 500 cyber incidents and has learned a few things in the process. When lawyers become involved in a cyber incident, the consider things like compliance (like HIPAA), insurance, liability, evidence preservation and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In what has to be called a really bad oopsy, the Dallas Police Department, during a data migration effort back in March, lost 22 TB of data. This includes data from at least one murder case. The Dallas DA said that the city of Dallas (as opposed to the DA) discovered the problem on April […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While many executive orders are a waste of good space in the Federal Register, so far executive branch agencies seem to be taking the Executive Order on Improving Cybersecurity seriously. The most recent result is that the Office of Management and Budget has ordered federal agencies to start documenting software that is identified as critical. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Answer: More and more of the time! If you have to comply with one of the growing number of state and country privacy laws, then a deletion request is much more than a request or hitting the delete key. While some of the details of each state’s law is different, the basics are the same. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you even know what this means? Actually, it means different things to different people, but they are all related. The first meaning is how long does it take a hacker to identify vulnerable systems after a vulnerability is disclosed? For example, when Microsoft disclosed the Windows Print Spooler attack, how long before hackers start […]
Continue reading →
[DISPLAY_ACURAX_ICONS]