The Great Crypto-Cop Brain Drain As if things weren’t hard enough for the cops, the ones that have been tracking down the bad crypto apples have discovered the grass is greener on the corporate side – a lot greener. And they are fleeing the government side, making things even harder for the remaining govies. Read […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dropbox says it was phished – simple as that. As a result, the attacker had access to 130 of its code repositories and downloaded a wide range of information. Dropbox has been very transparent about this, but it is both embarrassing and damaging to the company. The hackers socially engineered an employee to give up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
New White Paper on the Global Cyberwar and Societal Response We have just released a new white paper and are looking for feedback on this non-technical paper titled The Global Cyberwar and Societal Response. The target audience for this white paper is business and IT pros who want to be knowledgeable about managing company risk […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Get ready for this. We have five states that need to issue regulations and every one will have multiple iterations. Here is the current state of California’s regs, issued by the CPPA. In addition to the modified regulations, they also issued 16 pages of explanation. These takeaways are from Daniel Goldberg of the law firm […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Few Election Offices Use .Gov Domain Years ago, .gov domains cost $400. In a case of penny wise, pound foolish, something like three quarters of all election officers figured that saving $400 versus a non-spoofable domain name was a smart trade off. And we wonder why the hackers are winning. Credit: The Washington Post LinkedIn […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CISA issued a Binding Operational Directive. BODs only are “binding” on federal executive branch agencies, but this is one time where if it is good for the feds, it is good for you. The directive tells agencies to keep track of assets and vulnerabilities. They have six months to comply. Specifically, they want agencies to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]