720-891-1663

Choosing A Secure and Verifiable Technology

In light of the recent admission that the US Treasury Department was among the organizations compromised when vendor BeyondTrust was compromised, figuring out how to assess and doing the assessing of vendors, which today almost always includes technology, is clearly critical. A very large percentage of breaches we hear about involve vendors. For example: The […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Feds Order Marriott/Starwood to Implement Data Security Program

Marriott Hotels acquired the Starwood Hotel chain in 2016. Two years prior to the acquisition, hackers broke into Starwood’s systems. Marriott didn’t figure out that Starwood was compromised until two years after they acquired the chain. The only reason they figured it out then was they were migrating Starwood to Marriott’s system and discovered the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

CMMC Program Now in Force for DoD

Important notes: Contact us if you need assistance *** NOTICE TO THE CMMC ECOSYSTEM *** 16 December 2024 CMMC Reaches Significant Program Milestone Today Updated guidance for the Ecosystem and defense contractors as CMMC Title 32 Final Rule enters into force The Cyber AB is recognizing today’s effective date of the Department of Defense’s codification […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Crypto Companies Losing Ground to Deepfakes

While this particular study talks specifically about cryptocurrency companies, the trends are obvious and the impact to you and me are, unfortunately, similar. First what the crypto folks are seeing. 57 percent of crypto companies report audio deepfake incidents. 53 percent of crypto companies have encountered video deepfake fraud. This points to the very rapid […]

Continue reading → [DISPLAY_ACURAX_ICONS]