A few weeks ago, I read an article that provided significant insight into the Spy vs Spy battles between the Unites States and Russia. Title: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil It was...
Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence? Is it so because it is oft repeated? Inevitably, we are...
This past week I read a pretty interesting article, posted on SiliconANGLE, about vulnerabilities found in cloud applications. It had the unfortunate title of: Report finds 34M vulnerabilities across AWS, Google Cloud and Azure This was compounded by the lead off...
If your bank supports it, you would do well to consider Virtual Credit Card numbers for online purchases. I was looking around for some good articles that discussed potential pitfalls or problems and found this gem of an article. Suffice it to say, that the best part...
It’s not just that we are experiencing big firms getting breached due to sheer negligence, but that no one is going to do anything about it — yet we the people will suffer. First Equifax, then Deloitte. Not only does it appear that the reasons for the...
Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something...