While many executive orders are a waste of good space in the Federal Register, so far executive branch agencies seem to be taking the Executive Order on Improving Cybersecurity seriously. The most recent result is that the Office of Management and Budget has ordered federal agencies to start documenting software that is identified as critical. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Answer: More and more of the time! If you have to comply with one of the growing number of state and country privacy laws, then a deletion request is much more than a request or hitting the delete key. While some of the details of each state’s law is different, the basics are the same. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyber Insurance Company Coalition Says Claims Payment Down From Last Year Cyber insurer Coalition says that it’s clients’ average claims for losses for ransomware attacks was $184,000 for the first half of this year, down 45% from the second half of last year. This, they say, is because they are doing better at negotiating ransoms. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple is about to announce a new feature. They are going to start scanning everyone’s iPhone for banned content. Seriously. It uses neural networks and machine learning, so I am sure it will be cool. According to respected cryptography professor Matthew Green, it is going to scan everyone’s devices for child porn (now referred to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Over the last few years the police have been using the large commercial DNA databases to help them find criminals. The highest profile case was their use of DNA to find the Golden State Killer (1970’s and 1980’s murders; captured in 2018). They did that by running a DNA sample against GEDMatch, one of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following in the footsteps of the cybersecurity Executive Order, President Biden issued a National Security Memorandum last week on improving cybersecurity for critical infrastructure control systems – that is the computers that control our critical infrastructure. Like the EO, this NSM has specific details. The government has created a Industrial Control Systems Cybersecurity Initiative to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]