The U.S. Federal Cyberspace Solarium Commission issued its long awaited report last week and warned of a “catastrophic attack that leaves the nation in tatters”. While right now everyone is worried about Covid-19, this represents a longer term problem that won’t be fixed in a few months. The report creates a vivid hypothetical attack and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
DMARC is a technology that is designed to reduce the amount of spam that makes it into your mailbox. It provides an email’s recipient with instructions on how to validate a sender’s email. Unfortunately, it is a voluntary standard for both the sender and the receiver and if the sender doesn’t have DMARC setup then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Visser Precision, a precision parts contract manufacturer based in Denver, Colorado, has confirmed a “cybersecurity incident”. Visser makes parts for the likes of Tesla, Space X, Boeing and defense contractor Lockheed Martin. The ransomware was DoppelPaymer, is one of the Ransomware 2.0 variants that steal the data before they encrypt it. Some of that data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Maybe this is the NEW AND IMPROVED NSA. From the NSA document: This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities. Cloud customers have a critical role in mitigating misconfiguration and poor access control, but can also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Breaches Gone Wild – Very Wild Since EU’s GDPR went into effect on May 25, 2018 – about 18 months ago – 160,000 Breaches have been reported to EU authorities. A calculator will tell you that means that people are reporting between 250 and 300 security incidents A DAY! If you think that magically, 18 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you have tried to hire any cybersecurity talent recently, you know that experienced folks are hard to find, hard to keep and expensive. That is why we offer the virtual Chief Information Security Officer program. But if you are the federal government and you have hundreds of agencies and millions of employees – not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]