Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Apr 4, 2020 | Applications, Attack Vectors, Business, Internet, Mobile, Mobile Phones, Phishing, Phone, Privacy, Radio Show, Radio_Show, Security, Technology, updates and patches
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so...
Apr 4, 2020 | Agencies, Big Tech, Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, FDA, Fines and Penalties, Government, Hacking, Mobile Phones, Monitoring, Monitoring, Pandemic, Patching, Privacy, Quarantine, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, social distancing, Technology, Technology, Tracking, Updates
Technology Empowers Pandemic Response, But Privacy Worries Remain In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules scuttled...
Apr 4, 2020 | Access Controls, Attack Vectors, Business, Cybercrime, Cybersecurity, Government, Hackers, Internet, intrusion tactics, Malware, Mobile, Networking, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Remote-Work, Security, Technology, Technology, Vulnerabilities, Zero Trust, Zero-Day
Introducing Zero-Trust Access Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
Mar 28, 2020 | Artificial Intelligence, Big Tech, Biological Viruses, Business, Coronavirus, Corporate Reputation, Covid-19, Critical data, Facebook, Instagram, Internet, LinkedIn, Machine Learning, predictive algorithms, Quarantine, Radio Show, Radio_Show, Security, Snapchat, Social Media, Social Media, Social Networking, Technology
The Risky Business Gamble of AI The worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks. With almost everyone at home, they have more time to comment and research and share stories and opinions. This means that these...
Mar 28, 2020 | Applications, Big Tech, Biological Viruses, Business, Computers, Coronavirus, Covid-19, data sharing, FDA, Google, Google, Government, Internet, Internet Infrastructure, Quarantine, Radio Show, Radio_Show, Scalability, Security, Software As A Service, Technology
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic Site The entire Covid-19 pandemic has caused every business to question its capabilities whether from a business continuity standpoint or a complete re-imagining of its business practices. Some...
Mar 28, 2020 | Biological Viruses, Business, continuing education, Coronavirus, Covid-19, Covid-19, Cybercrime, Cybersecurity, Cybersecurity Professional, CyberTraining, Government, Internet, Law Enforcement, Monitoring, Pandemic, Police, Professional Security Researchers, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Social Distancing, Technology, White-Hat Hackers
White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals. Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Mar 28, 2020 | Business, Cybercrime, Government, Internet, intrusion tactics, News, Radio Show, Radio_Show, Ransomware, Security, Technology
Monitoring Your Logs Can Prevent Business Ransomware Attacks Ransomware gangs using some sophisticated tactics are able to break into company networks and look around for days and even weeks at a time before, exfiltrating extensive amounts of information without being...
Mar 28, 2020 | Covid-19, Government, Monitoring, Pandemic, Quarantine, Security, Social Distancing, Surveillance
Mandated Tracking and Reduced Freedom of Movement in Socialist Hong Kong If you plan on visiting Hong Kong anytime in the near future be prepared to be tracked. You will be required to wear a wristband that monitors your movements to make sure you are obeying all...