720-891-1663

DoD Contractors: Will You Have to Replace Your MSP?

If you are a defense contractor, then over the next few years you will likely have to be compliant and maybe certified for CMMC, either at level one or level two. Level one has about 17 controls and 59 assessment objectives; level two has 110 controls and about 315 assessment objectives. Assessment objectives are the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Microsoft Plans to Deprecate 1024 Bit RSA Keys

Microsoft is often between a rock and a hard place. They would like to be more secure but not at the expense of offending their customers. Here is an example of that. Microsoft has announced that RSA keys shorter than 2048 bits will soon be deprecated in Windows Transport Layer Security (TLS) to provide increased […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Justice Department Going After Cybersecurity Fraud

The False Claims Act (FCA) is a Civil War era law that both penalizes companies for lying about their cybersecurity protections and rewarding whistleblowers for turning in fraudsters. In 2021 the Justice Department created a new initiative to stem civil-cyber fraud. One of the beneficiaries of that is the Defense Department which has been plagued […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Another Law Firm Gets Security Religion – AFTER Hackers Stole 325,000 Customer’s Data

The Houser LLP law firm specializes in taking care of high-profile financial institutions. Last May they were hacked. Ten months later they are finally notifying those high profile customers. They eventually were forced to disclose the breach to the Maine AG (among others). They said files were encrypted (AKA ransomware) and data was stolen. Data […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending March 1, 2024

Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Facebook Users Fighting ‘Consent or Pay’ Model

First of all, this is not happening in the U.S. because the U.S. does not have a national general privacy law. For all of its flaws, Europe’s GDPR at least has possibility of reigning in big tech a little bit. In most parts of the world, Meta users (Facebook and Instagram) have two choices – […]

Continue reading → [DISPLAY_ACURAX_ICONS]