The most recent federal administration’s security “malfunction” is with the use of a Signal app clone called TeleMessage. Signal (or TeleMessage) is the app that the Secretary of Defense used to communicate war plans to the VP and others, including the editor of The Atlantic. TeleMessage is a clone of Signal (as well as WhatsApp […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Homeland Security Secretary Kristi Noem faced intense questions from the House Appropriations Homeland Security Subcommittee. She wants to slash almost $500 million from the CISA budget. While the appropriations committee was looking at DHS’s funding across all of its agencies, they made a point of demanding more info on the administration’s financial plans for CISA. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of us in the industry this is not a surprise, but to others it may be. That title used to belong to Russia, but not any more. Russia is busy with a war and while it still is good at launching ransomware attacks, otherwise, it is more than a bit distracted. China, on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
More Countries Issue Travel Advisories for Travel to US The White House is trying to spin growing international concerns over travel to the U.S. in response to U.S. immigration and transgender rights policies, among other issues. Countries updating their advisories include New Zealand, Germany and the U.K, citing concerns over terrorism, civil unrest and stricter […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I always say, the reason we have so much cybercrime is that it really pays. Here is the “elevator pitch” version. Remember, this only represents the people who reported the crimes to the FBI. That means that this number is dramatically low. And, while the number of complaints reported year over year is up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Work from Home Security Considerations As your employees use their company issued laptop at home or at Starbucks, consider whether your security suite is still protecting them. For example, in the office they are behind your firewall (hopefully) and that adds a layer of protection that does not exist when they are working from home. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]