Encryption can be very secure. Or Not. It depends on how it is implemented. Apparently, at least according to some sources, most of the Internet has gotten it wrong. That’s not very comforting. The rules of who people are protecting themselves from has changed from just a few years ago. Now we are talking about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The New York Stock Exchange, in partnership with Palo Alto Networks, 40+ authors and The Security Roundtable, have published a free eBook entitled Navigating The Digital Age: The Definitive Cybersecurity Guide for Directors and Officers. While some might argue about the hyperbole surrounding calling it THE DEFINITIVE GUIDE, it does provide a lot of information […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Businesses have long complained about complying with 46 different cybersecurity/privacy laws (plus the District of Columbia, Guam, Puerto Rico and the US Virgin Islands) and the lack of a national privacy law. Alabama, Kentucky, New Mexico and South Dakota are the only states without such laws. The states have fired back saying that a national […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AT&T released it’s first public cybersecurity incident analysis report last week. As a network security services provider, they get to see the attacks in real time. One service that AT&T offers is to mitigate security threats in the network before they ever reach you. They also offer cyber security consulting services. AT&T’s competitor Verizon also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Former NSA director Michael Hayden says that he would not support [FBI] Director [James] Comey’s demands for access, according to a story by Motherboard. This goes against the “wishes” of the current FBi director and head of the NSA. It is clear to me that if everything is transmitted unencrypted, with weak encryption or with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
American Banker ran a piece this morning digesting the Experian breach announced last week. It said it was good that the breach only compromised 15 million T-Mobile customers instead of the hundreds of millions of customers that probably live in the Experian Decision Analytics service platform and that it only took them two weeks to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]