CISA’s SECURE SOFTWARE DEVELOPMENT ATTESTATION FORM rule comes into effect next week. It requires that companies that produce software and sell it to the government adhere to key security practices. It also requires that those developers attest to their practices. In writing. Signed by an executive of the company. It applies to companies that do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unfortunately, other than the very large water and other utilities, most utilities do not have the money, manpower or desire to secure their networks. We continue to hear more stories of successful attacks. In April a Russia-linked hacking group, the Cyber Army of Russia, claimed responsibility for an attack on a water and wastewater system […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Senator Ron Wyden, who is possibly the biggest advocate on Capitol Hill for cybersecurity and privacy, laid into UnitedHealth Group’s CEO for their cybersecurity practices. Their practices led to a breach that affected possibly one third of the adults in the US who have health insurance. Senator Wyden also asked the FTC and SEC to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While it seems that some companies continue to be clueless and others get fined (and sued) for delaying reporting breaches, the window (and door) is closing rapidly on that. The SEC says that publicly traded companies have 4 days after determining that a breach is material to file an 8-K to notify investors. DoD contractors […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the announcement every day of a new breach, that CISO’s confidence is growing is a bit strange. I think it is more how the media is viewing the numbers. 70 percent of surveyed CISOs feel at risk of a material cyber attack over the next 12 months. That is up from 68 percent last […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The government is escalating their response to cyber attacks and they are having a little bit of success, but as we have seen recently, that means that they are also going against companies that do not have adequate security. In addition, we have seen that they are going the people in those companies who should […]
Continue reading →
[DISPLAY_ACURAX_ICONS]