720-891-1663

TSA Issues Emergency Cybersecurity Mandates for Aviation Sector

Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Feds Release National Cybersecurity Roadmap

The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

48% of Code Bases Examined Contained High-Risk Vulnerabilities

Mergers and acquisitions are a time to tread carefully. While all M&A teams review financials, sales projections, key personnel, etc., it is much less likely that the review includes examining the code base being acquired for vulnerabilities. That is probably not a good decision. Synopsys sells a service to review software during mergers and acquisitions […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending February 24, 2023

European Governments Want to be Able to Snoop on ALL of Our Communications As is usually the case, their excuse it that “it is to protect the children”. They want to break encryption while sprinkling magic fairy dust to not break encryption (an impossibility) in an effort to force kiddie porn traders (now called child […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Google Working to Improve Android Hardware Security

As operating system vendors (Apple and Google) improve their security and make hacking their products more difficult, hackers are looking elsewhere for “ways in”. While users consider their phones a single computer, the reality is that there are whole bunch of computers under the hood. Processors for each radio in the phone such as the […]

Continue reading → [DISPLAY_ACURAX_ICONS]