720-891-1663

Pipeline Operators Are In the Crosshairs – From Both Regulators and Hackers

The Colonial Pipeline attack exposed what a lot of us have been saying for years – that when it comes to U.S. critical infrastructure, the emperor has no clothes. After the attack on Colonial was dealt with, TSA issued a directive very quickly that was pretty superficial. It required, among a couple of other things, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

IoT Bug Could Lay Waste to Factories ….

When people talk about IoT – Internet of Things – these days, they are thinking of Amazon Alexa or Phillips Vue lightbulbs, but where IoT started was in factories and warehouses, decades ago. Industrial automation or IIoT is still where the biggest in IoT attacks lies. Today we learned about a critical remote code execution […]

Continue reading → [DISPLAY_ACURAX_ICONS]

How Fast Can You Detect a Supply-Chain Ransomware Attack?

In light of the recent series of supply chain attacks (actually going back to 2011 at least), speed is crucial. SolarWinds, Microsoft Exchange, Kayesa and others. This weekend’s attack against MSP software provider Kaysera is a perfect example of why speed is so important. Many small and medium sized companies are dependent on managed service […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending June 25, 2021

Paying Ransom is Tax Deductible Under current IRS regulations, paying cyber ransom after a hack is deductible, just like losses from a robbery, but the IRS is “looking into it”. One way the government could discourage ransom payments is if the cost is borne fully by the company’s owners. They still might choose to do […]

Continue reading → [DISPLAY_ACURAX_ICONS]

NIST Prepares Post-Quantum Encryption Standards

Long before quantum computing becomes “main stream”, state actors will have access to it. In part, because they command large budgets; in part because it is important to them. Why do they care? Because, it will allow them to decrypt both communications that they intercept going forward and communications that they have intercepted in the […]

Continue reading → [DISPLAY_ACURAX_ICONS]