All Posts

We Want Guidance on How to Manage Risk

“People in the GRC world, we like frameworks, and we like checklists. We like a clear model,” said Meghan Maneval, director of technical product management, RiskOptics.…

A Fireman? A Princess? How About a CISO?

As children, we don’t dream of becoming a CISO, but yet we still have them. What is it a security professional can learn or even…

Cybersecurity News: Meta’s Record EU fine, China bans Micron, Tornado Cash hacked

Meta receives record fine over EU data transfers The European Union fined the social networking giant 1.2 billion euros for privacy violations related to transferring…

AI Attacks Are More Frequent and More Tailored

We’re going through a period of increased scrutiny around AI these days and who knows if regulations can be put in place to curtail the…

Cybersecurity News: HP’s bricked printers, PyPi repository attack, Samsung security flaw

HP rushes to fix bricked printers after faulty firmware update A bad firmware update has been bricking HP Office Jet printers around the world since…

Cybersecurity News Week in Review:  Supreme Court’s 230 ruling, Tech giants hit, TLD phishing vectors

This week’s Cyber Security Headlines – Week in Review, May 15-19, is hosted by Rich Stroffolino with our guest, Dave Hannigan, CISO, Nubank Cyber Security…

Cybersecurity News: Supreme Court’s 230 ruling, Montana bans TikTok, Guerilla smartphone malware

Supreme Court shields Twitter from liability and leaves Section 230 untouched It was a good day for Silicon Valley on Thursday as the Supreme Court…

Cybersecurity News: Lancefly hits Asia, Meta record EU fine, Phishing TLDs

Lancefly group hits Asia Symantec released a report on a state-backed threat group known as “Lancefly.” It monitored the group using a custom-made malware in…

Do RFPs Work?

Do RFPs or request for proposals work as intended? It seems they’re loaded with flaws. Yet for some organizations who must follow processes, they become…

“Hacking the Future of Risk Management” – Super Cyber Friday

Please join us on Friday, June 2nd, 2023 for Super Cyber Friday. Our topic of discussion will be “Hacking the Future of Risk Management: An…

20 Ways to Ensure Security Remains/Becomes Everyone’s Responsibility

Every security department has a limitation: it can’t be on the front lines of every business activity all the time. The charge to make security…

Cybersecurity News: Inside RaaS, cyber education initiatives, attacking TP-Link routers

An inside look at RaaS A new report from Group-IB details the inner workings of the ransomware-as-a-service operator Qilin. The firm infiltrated the group in…

I’ve Got Plenty of Risk If You Want More

It seems anything that’s added to a business, like a new app or a third party vendor, just adds more risk. Risk definitely piles up…

Cybersecurity News: Philadelphia Inquirer cyber attack, DOT breach exposes federal employee data, 3 million data breach notices sent to SchoolDude users

Cyber attack hits Philadelphia Inquirer Over the weekend, a cyber “incident” halted The Philadelphia Inquirer’s Sunday print edition. Staff reported issues accessing the company’s content…

Supply Chain Attacks Change the Economics of Cybercrime

Those who can be targets for cyberattacks has dramatically widened, thanks to the success of supply chain attacks. A single attack on one critical supply…

Cybersecurity News:  Discord suffers data breach, Toyota data exposed, ABB confirms incident

Discord suffers data breach The popular VoIP and instant messaging social platform has suffered a data breach that has resulted in unauthorized access to a…

Cybersecurity News Week in Review: Easterly AI warning, Windows admin alerts, Dallas ransomware fallout

Cyber Security Headlines – Week in Review, May 8-12, is hosted by Rich Stroffolino with our guest, Paul Connelly, Former CISO, HCA Healthcare Cyber Security…

Cybersecurity News: Twitter encrypts messages, Microsoft’s Outlook patch, Seoul hospital breached

Twitter launches encrypted private messages Although direct messages sent on Twitter will be end-to-end encrypted, ex-CEO Elon Musk warned that this is an early version,…

Successful Cloud Security

What are the moves we should be making in the cloud to improve our security? What constitutes a good cloud security posture? Check out this…

Cybersecurity News: Leaked Intel keys, trading security for fps, new phishing-as-a-service tool

The long term impact of leaked Intel Boot Guard keys Earlier this year, a ransomware attack against the PC OEM MSI by the organization Money…

Join us in Denver 6-7-23 for CISO Series Podcast LIVE at RMISC

Fans of CISO Series who also live in Denver, come join us at the Rocky Mountain Information Security Conference (RMISC) as we launch the event…

Cybersecurity News: ‘Snake’ malware network takedown, ‘PlugwalkJoe’ behind massive 2020 Twitter hack, DoJ takes down 13 DDoS-for-Hire sites

Operation Medusa takes down ‘Snake’ malware network The US Department of Justice (DoJ) announced that a joint operation dubbed Medusa has decimated a 20-year-old malware…

What Kind of Challenges Do You Foresee In Firing Me?

This show was recorded in front of a live audience in New York City! This week’s episode is hosted by me, David Spark (@dspark), producer of CISO…

Cybersecurity News: Dallas ransomware, spoofed Facebooks ads, Merck insurance ruling

Dallas still reeling from ransomware Last week, the city of Dallas confirmed it suffered a ransomware attack. The Royal ransomware organization took credit. Over the…