Low Code/No Code Apps Not A Security Nirvana Just because the computer is generating much of the code does not mean the software doesn’t have bugs or is secure. In fact, since many times non-developers are using the tools, the code may be less secure. Details at The Hacker News As If Twitter Doesn’t Have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Joe Sullivan, Convicted Former Uber CISO, Speaks Out Sullivan spoke at Black Hat Europe. Unfortunately, he did not say much directly about the case because he is appealing it, but he did have some interesting thoughts about where CISOs are headed and what you should or should not do. I didn’t know this but he […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Come tomorrow and Monday, there are changes in store for publicly traded companies when it comes to cybersecurity. This will help everyone else since virtually all companies have publicly traded companies who are vendors or business partners and this extra information will help you understand your partners’ cybersecurity efforts. Industry groups and Republicans aren’t excited […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Warns That Iran Terrorists Broke into Multiple US Water Facilities Last week I reported that the Aliquippa, Pennsylvania Water Authority fessed up to the fact that hackers successfully broke into their network, compromising a pump station, using a vulnerability in an Israeli OT network system that is repackaged by multiple vendors. Now the FBI, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Health and Human Services (HHS) says it is planning to take a range of actions to reduce cyberattacks on hospitals which have gone a bit crazy in the last few years. They released the proposal yesterday. The plan is to tie the new cybersecurity requirements through the Medicare and Medicaid programs, tying payments to baseline […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]