VentureBeat wrote an interesting item pointing out some of the obvious things that Target messed up. Fixing these items won’t stop every attack, but it certainly would slow the attackers down. According to a lawsuit filed in federal court recently Target missed the ball on a few things. Of course, at this point, these are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Katie Moussouris, formerly an executive at Microsoft and Symantec and now an executive at HackerOne, which as best as I can tell manages bug coordination with third parties for very large, well respected companies, tells a story about an over enthusiastic security person at Charles de Gaulle airport in Paris. She was tapped for secondary […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In some sense, cyber attacks are no different that physical world attacks; in other ways, they are completely different. Let’s assume that you did not physically catch some bad guys that broke into a building. Do you know who broke in? On rare occasions they leave something behind – there have been instances so rare […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The media has been talking about the feds running Stingrays and Dirtboxes to gather cell phone data on potentially thousands of Americans. The government’s take on this has been that a warrant is not required. The FBI made their position known in a private briefing to the Senate Judiciary Committee last week. The result was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As has been the case for more than 10 years, California leads the way, for better or worse, for the rest of the country in protecting resident’s privacy. Their original breach law, SB 1386, is the model for laws for the rest of the country. So, what is new in 2015 – read on. If […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of us who are not insurance experts, the distinction may not be obvious. As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]