720-891-1663

Cisco Learned About the Insider Threat Problem – the Hard Way

I talk a lot about the insider threat problem because it is prevalent and hard to stop. Cisco learned about that the hard way. Sudhish Kasaba Ramesh resigned from Cisco in April 2018. OK, good, time to move on. FIVE MONTHS LATER, he accessed Cisco’s infrastructure at Amazon and deployed code that shut down 16,000 […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending August 28, 2020

Ransomware is an Equal Opportunity Business As American businesses deal with ever increasing ransomware attacks, larger ransom demands and ransom and extortion wrapped up together, we are not alone. Not that the fact that we are not alone should make us feel better. A new Iranian hacker group is using Dharma ransomware to go after […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending August 21, 2020

August 13th, a Day That Will Live in Confusion August 13th is the day that Part B of Section 889 of the 2019 National Defense Authorization Act went into effect. It bans the use of equipment and services tied to certain Chinese companies that have been deemed security threats by the United States. Companies that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending August 14, 2020

China and Russia Continue to Interfere with the Elections According the the White House, China has been targeting the US election infrastructure ahead of the election and Russia has been trying to undercut Democratic candidate Joe Biden, much like their did with Clinton in 2016. Could it be that Russia thinks that the Republican Administrations […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Multi-Factor Authentication is NOT a Silver Bullet

As hackers got better, so did developers. Multi-Factor authentication, a technique which requires something that you know, like a password and something that you have, like an SMS message on your phone, makes the lives of crooks harder, but far from impossible to attack and here is why. One way this is done is via […]

Continue reading → [DISPLAY_ACURAX_ICONS]