Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Nov 30, 2019 | Best Practices, Business, China, Cyber breaches, Cybersecurity, Data, Economic Disruption, Hacking, Internet, Iran, Nationstates, North Korea, password spraying, Phishing, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Russia, Security, Security, Security, Software, Technology, Vulnerabilities
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Nov 1, 2019 | Business, China, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Government, Hackers, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Nationstates, News, North Korea, Organized Crime, Privacy, Radio Show, Radio_Show, Regulation, Russia, safety, Security, spying, Surveillance, Technology
Cyber Cold War Right on Our Door Step Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Oct 5, 2019 | Agencies, Anti-Virus, Applications, Business, credentials, Cybercrime, Cybersecurity, DHS, Exploits, Government, Hackers, Hacking, Kapersky, Malware, Radio Show, Radio_Show, Russia, Security Alerts, spying, Technology
Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products It has been two years since a Binding Operational Directive was issued by the Department of Homeland Security to all Federal executive branch departments and agencies directing...
Aug 31, 2019 | Best Practices, Business, Computers, cyberattacks, Cybercrime, Hackers, Hacking, Infosec, IoT, Nationstates, Radio Show, Radio_Show, Russia, Security
Unsecured IoT is a Playground for Hackers Playground Microsoft made news recently at the annual Black Hat conference in Las Vegas, generating a lot of buzz about its discovery of a malicious Russian hacker group using some common Internet of Things (IoT)...