720-891-1663

Feds Trying to Figure Out Liability for Software Bugs

The Cyberspace Solarium Commission created a list six years ago of things the government should be doing with regard to cybersecurity policy. The commission made 82 recommendations and each year some of them have been enacted into law, usually as part of the national defense authorization act (NDAA), a must pass bill that funds the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for October 18, 2024

Now North Korea Using Fake IT Workers to Extort Employers Scams evolve. Now that the scam concept is public, North Korea is pivoting. They are extorting the companies that hire these North Koreans as IT employees after the employees steal corporate secrets. Read the details here. SURPRISE! (Not) – OpenAI Confirms Attackers use ChatGPT to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researchers Say Businesses Think Their Cybersecurity is Better Than it is

For those of in the cybersecurity industry this is not a big surprise. MxD is recognized as the National Center for Cybersecurity in Manufacturing by the Department of Defense and they conducted some interesting research. They conducted a survey of 750 manufacturing firms in several industries, including both big and small companies. Here is a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for September 27, 2024

White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Are Railroads the Next Infrastructure Attack?

We already know that water plants (another one in Kansas was attacked this week), power and healthcare are under constant attack. The industries and the government are paying attention to these with some limited success, but at least it is on everyone’s radar. One sector that has tried to stay out of the spotlight but […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Third Party Risk Management in Light of Hezbollah and Twilio Attacks

I know I sound like a broken record, but as businesses start to improve their internal security, attackers focus on compromising businesses’ supply chains. In the case of the Hezbollah attack, the attackers must have, some how, known (a) that they were buying new walkie-talkies and pagers, (b) who they were buying them from, (c) […]

Continue reading → [DISPLAY_ACURAX_ICONS]