Does society want governments to take on the role of protecting the Internet? Should the Internet be considered a Critical Infrastructure and therefore be overseen by governments? Will such actions undermine privacy and liberty or will it be demanded
Microsoft and partners have taken down the Trickbot ransomware infrastructure. That is a temporary relief, as the cybercriminals will soon adapt. The bigger picture is how the Microsoft Digital Crimes Unit (DCU) has created a template and partnership
Security experts say don't pay ransomware, but now the U.S. Treasury Department is now declaring it illegal! Every company on the Internet must deal with the threat and emerging regulations.
Ransomware continues to be a growing problem because vict
New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims. By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into bec
The U.S. Department of Justice filed charges against six Russian agents, identified as members of the APT group known as Sandworm. The unsealed documents reveal that the six suspects are all current or have former ties to the Russian foreign intelli
"Why Sacramento is Ripe to be a Cybersecurity Hub" panel discussion, was lively and engaging. Moderated by Carmen Marsh and featuring Malcolm Harkins, Matthew Rosenquist, and George Usi, the panel discussed a broad range of topics including: Why pick
The U.S. National Security Agency knows which vulnerabilities China backed hackers are exploiting the most to gain access to sensitive data.
The Chinese state-sponsored information gathering engine is a vacuum when it comes to acquiring information fr
October is Cybersecurity Awareness Month. It is a time to consider the risks we accept everyday when using computers and what we can do to better protect ourselves.
I have a challenge for each and every person. Something that will help people indiv
The California Consumer Privacy Act (CCPA) has been around since 2018, as the more protective data privacy legislation of any state, but not all businesses have been acting ethically in their compliance and respect for user privacy.
As a result, the
The government’s Central Bank of the Bahamas has released the world’s first Central Bank Digital Currency (CBDC) - the “SAND DOLLAR”.
This is attracting the interest of cybercriminals as well as security professionals. As national currencies transfor
A group of security vulnerability researchers, after many months of work, were able to figure out the update process and secret key used to decrypt Intel microcode updates for the Goldmont architecture product lines.
This is an important finding as it
Jack Roehrig, CISO at Turnitin, and I shared insights on how to incorporate Cyber Culture as part of an organization's Cyber Strategy.
A website tied to an event that quizzed people on their hacking knowledge, launched by major a security consultancy firm, is itself vulnerable to being hacked.
This incident showcases a number of important lessons for every organization that wants to
I may offend some people, so for those who don’t want to hear my rant, skip this video.
Recent cybersecurity predictions aren’t just wrong, they are dangerous
I am disappointed in the recent comments that Michelle Zatlyn, the co-founder and COO of Clou
Another vulnerability and exploit named VoltPillager has been published for Intel Corporation's SGX security technology. The attack itself is simply a hardware version of a previously discovered PlunderVolt software vulnerability where voltage to th
Even the best security organizations can be hacked! Watch my message to both the cybersecurity industry as well as those attackers that hacked FireEye and stole the RedTeam tools.
This skirmish went to the hackers, but the battle continues.
A recent incident involving city surveillance video data highlights some of the criminal privacy risks of public camera and biometric programs. Without strong cybersecurity, everyone’s privacy could be undermined by cyber attackers, criminals, and m
The cybersecurity field is dynamic and the roles and responsibilities are ever changing. People coming into the cybersecurity field often expect clearly defined positions and are surprised at the significant variance when looking at job descriptions
Intangibles now account for 90% of the S&P’s total assets and it is no accident that the core of cybersecurity has evolved to protect those aspects of the business. It is a natural progression for security to align with protecting the most important
Note: this page contains paid content.
Please, subscribe to get an access.