The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after all, things th… Continue reading A Cyber Executive Order For the 21st Century
Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of new tools and technologies. A recent survey revealed that nearly 80% of organi… Continue reading Product Showcase: Acronis Cyber Protect
In United States v. Carpenter, the United States Supreme Court ruled that, before the police could obtain historical cell site location information (CSLI) about the location of someone’s cell phone in the past, they had to seek and obtain a warrant fr… Continue reading Federal Court Narrows ‘Third Party’ Warrant Requirement
“Click here to claim your bonus pay,” said email from a British train company. But it was a phishing test—and now the staff are hopping mad.
The post Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues appeared first on Security Boule… Continue reading Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues
Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind the attack and the cyberc… Continue reading DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack
Recently, the Washington, D.C. police department suffered a ransomware attack when the Babuk Group gained access and encrypted and stole approximately 250 gigabytes of sensitive data from the department’s servers. The Russia-based criminal entity post… Continue reading Ransomware Attacks on Municipalities Continue
Are cybercriminals by nature evil? Only the 1930s pulp magazine hero The Shadow really knows “what evil lurks in the hearts” of cybercriminals. At first glance, it would appear there is great deal of darkness in the hearts of malicious ha… Continue reading Are Cybercriminals Evil or Greedy?
Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of Knowledge (CBK). Hosted by an (ISC)² Authorized Instructor, the CISSP Webcas… Continue reading Webcast: Get a sneak peek inside the CISSP domains
Humans are the biggest risk to an organization’s cybersecurity posture, and it might be a bigger risk than many realize. According to research from Elevate Security, human behavior had a direct role in 88% of total losses in the largest cybersecurity … Continue reading Your Security Awareness Training Isn’t Working
One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one of the most dangerous substances we encounter every day. R… Continue reading Of Pipelines And Cybersecurity