720-891-1663

NSA Publishes Cloud Security Risk Mitigation Guide

Maybe this is the NEW AND IMPROVED NSA. From the NSA document: This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities. Cloud customers have a critical role in mitigating misconfiguration and poor access control, but can also […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Telcos Not Doing Good at Preventing SIM Swap Attacks

A SIM is the (usually) hardware card that gives your phone its “personality”.  The SIM is tied to the carrier and contains all the information that the phone needs to talk to your carrier. As users SLOOOOWLY migrate to using text messages as an extra layer of authentication for logging in to a variety of […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending January 10, 2020

Albany Int’l Airport Hit By Ransomware via MSP In what is becoming an all too common story, the Managed Service Provider that supported Albany, NY’s airport, Logical Net of Schenectady, NY, was hacked and from there, the hackers were able to connect to the airports administrative network and infect it with REvil ransomware, the same […]

Continue reading → [DISPLAY_ACURAX_ICONS]

And You Think YOU Have a Problem Finding Cybersecurity Talent

If you have tried to hire any cybersecurity talent recently, you know that experienced folks are hard to find, hard to keep and expensive.  That is why we offer the virtual Chief Information Security Officer program. But if you are the federal government and you have hundreds of agencies and millions of employees – not […]

Continue reading → [DISPLAY_ACURAX_ICONS]