The only way that any company is going to get to real security is if they get to Secure by Design. What does that mean? Well, there is no hard and fast definition, but here are some good suggestions: LIMIT SHADOW IT You can’t protect what you don’t know is there. Shadow IT also has […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just call me dumb. For the last couple of years the feds have been claiming that Chinese equipment manufacturers like Huawei pose a national security risk to the United States. I really didn’t understand this since all the data transmitted over the cellular network is encrypted, so what is the problem. First, in theory, after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Let’s assume that you are interested in buying cybersecurity insurance. It is very likely that the underwriter is going to use one of the External Attack Surface Management tools (EASM) like the ones we sell to decide whether to write insurance for you. Your customers may also use an EASM tool to decide whether to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I received a letter from a high end accounting firm in New York today warning their clients that check fraud has “increased significantly” and has become “a more prevalent issue”. They recommend that you review bank transactions daily confirming the correct payee and amount. The problem with that strategy is that check images are typically […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Board members and other executives are the key target of hackers. There is even a term for it – whaling. This has nothing to do with anyone’s personal dimensions, but rather that they are the big fish in the pond and have the most access to data. Many times, executives and board members are also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The cloud is not magic. Nor does it fix all vulnerabilities. Cases in point. Two security vendors are accusing Microsoft of unnecessarily putting customers’ data at risk. The vendors, Orca Security and Tenable, are not bit players with a grudge, so you have to, at least, listen to them. According to the source: In a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]