Security First, Apple Stands Ground on iPhone Encryption
Security First, Apple Stands Ground on iPhone EncryptionThe Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to break...
No Security for Windows 7 After Today
No Security for Windows 7 After TodayAre you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Technology Can Only Protect You So Much — Then Other Tactics are Needed
Technology Can Only Protect You So Much --- Then Other Tactics are NeededBusinesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the cyber-attack...
Zero-Day Browser Vulnerabilities
Zero-Day Browser Vulnerabilities“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
A Lesson to Learn – If it is Connected It can Be Hacked
A Lesson to Learn - If it is Connected It can Be HackedI remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product was...
Routers and Firewalls with Broadcom Chipsets Are Vulnerable
Routers and Firewalls with Broadcom Chipsets Are VulnerableHave you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...
Social Engineering Comes to the Forefront of Attacks
Social Engineering Comes to the Forefront of AttacksWe depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Updates, Patches and Hackers Oh My!
Updates, Patches and Hackers Oh My!Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time - patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network system...
Cyber War isn’t Coming It is already Here!
Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
How Mature is Your Insider Threat Intelligence?
How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...