720-891-1663

In the Wake of Breaches, Insurers Look to Rescind Policies

As loss payouts on cyber policies continue to increase, carriers are looking for ways to get out of paying. Since cyber insurance is a non-standard-form policy, you really have to read it carefully to understand whether you are complying. For example, in reviewing one client’s policy, we discovered that if the client did not perform […]

Continue reading → [DISPLAY_ACURAX_ICONS]

WHY is Huawei a Cybersecurity Risk?

Just call me dumb. For the last couple of years the feds have been claiming that Chinese equipment manufacturers like Huawei pose a national security risk to the United States. I really didn’t understand this since all the data transmitted over the cellular network is encrypted, so what is the problem. First, in theory, after […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending July 22, 2022

San Francisco Cops Want Real-Time Access to Private Security Cameras for Surveillance San Francisco lawmakers are considering a bill that would allow police to use private security cameras for real time surveillance. This bill expands a 2019 city ordinance that requires police to seek authorization before acquiring and deploying surveillance, hence this notice. While it […]

Continue reading → [DISPLAY_ACURAX_ICONS]

License Plate Readers in a Post-Roe America

Without delving into the politics of Roe v. Wade, the decision and the laws that are happening as a result of the recent Supreme Court decision, bring up some very challenging privacy issues. Automated license plate readers can be found in many places. There is an entire network of tow truck owners that collect license […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending July 8th, 2022

ZuoRAT Hijacks SOHO Routers Researchers have found a multi-stage remote access trojan (RAT) being used against a wide range of small and home office routers in Europe and North America. The RAT has been active since 2020 according to the researchers. The malware exploits known vulnerabilities (which is why patching IoT devices and making sure […]

Continue reading → [DISPLAY_ACURAX_ICONS]