Personal Online Privacy – Connecting Online

When California passed an online privacy law that will take effect on Jan. 1, 2020, it made me think about a user’s responsibility when it comes to how we engage online.
As online privacy starts to become a larger discussion, it’s importan… Continue reading Personal Online Privacy – Connecting Online

NIST & Microsoft partner for patching pointers

The US Government’s National Institute of Standards and Technology and 8,000,000 pound gorilla Microsoft are working together to provide industry with definitive guidance on keeping…
The post NIST & Microsoft partner for patching pointers a… Continue reading NIST & Microsoft partner for patching pointers

SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

To pay or not to pay? That’s the dilemma hundreds of organizations caught in the continuing surge of crippling ransomware attacks have faced. Related: How ransomware became such a scourge The FBI discourages it, as you might have guessed. What&#8… Continue reading SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the daunting challenge of preserving the… Continue reading MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber at… Continue reading SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be. Related: Automating threat feed analysis Peerlyst is another step in that direction. Started by infosec pr… Continue reading MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer