Tech Industry Pain Good for NSA Rob Joyce, NSA’s cyber director, says that they are seeing a boost in recruitment following waves of layoffs in the tech sector. While he is not giving numbers, any help with mid and high level recruiting would be good for the good guys. Remember that due to the clearance […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you sell to the federal government – any agency – you need to pay attention to this. Until now only DoD contractors were going to have to comply with CMMC or NIST SP 800-171. The standard requires 100% compliance with 110 controls; some of them pretty straight forward like having each user having their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week it was revealed that VoIP communications company 3CX was compromised and was distributing a malicious version of their desktop software to hundreds of thousands of paying customers. This is not an attack where users go to find sketchy websites and download “free” software that should be paid for. Rather, this is licensed software […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AT&T lost control of data of nine million customers. T-Mobile lost data belonging to tens of almost a hundred million customers. Other carriers have too. All mobile providers collect a lot of data. Data for billing, data for profiling, data for selling ads. All kinds of data. Location data. They know every cell site that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
China has long ranked at or near the top of U.S. national security officials’ list of cyber adversaries. On Wednesday, spy agency leaders warned that China is getting even bolder and better in cyberspace. The spies say that if China believed that it was on the verge of a major conflict with us, they might launch […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]
Continue reading →
[DISPLAY_ACURAX_ICONS]