720-891-1663

Vendor. Cyber. Risk. Management!

I don’t know how to say this any more clearly, but vendors represent a huge risk to every organization. Lion Air, the Indonesian parent of Malindo Air and other subsidiaries that were breached, confirmed the breach last week. Why did they confirm it?  Perhaps they were being good corporate citizens.  An alternative explanation is that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security news for the Week Ending September 20, 2019

A New Trend?  Insurers Offering Consumers Ransomware Coverage In what may be a new trend, Mercury Insurance is now offering individuals $50,000 of ransomware insurance in case your cat videos get encrypted.  The good news is that the insurance may help you get your data back in case of an attack.  The bad news is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Internet of Things is Still a Privacy Dumpster Fire

No, not literally, but close. Researchers investigated 81 Internet of Things (IoT) devices like smart TVs or security cameras. The researchers ran 34,000+ experiments and found that 72 of those devices contacted someone other than the manufacturer.  For example, almost all of the TVs contacted Netflix, even if you don’t have a Netflix account.  For […]

Continue reading → [DISPLAY_ACURAX_ICONS]

How Long Should Vendors Ship Software Patches

As computers and software become more integrated into every facet of our lives, and as security attacks on our infrastructure become part of the news every day, the question of software patches and upgrades need to become a factor in purchasing decisions. Whether it is a consumer Internet connected baby monitor (who’s bugs have compromised […]

Continue reading → [DISPLAY_ACURAX_ICONS]

DoD Releases Draft CMMC Guidelines

The Department of Defense is probably the largest software development (and hardware development) organization in world but unlike say Microsoft or Cisco, almost all of the development is performed by third parties – the so called defense industrial base or DIB. It is also likely the number one target of nation state hackers since a […]

Continue reading → [DISPLAY_ACURAX_ICONS]