All Posts

How to Always Make a Business Case for Security

How can security leaders and how do they go about matching business case to every security action you want to take? Is this the right…

Cybersecurity News: “New class” of Russian attackers, GitHub helps open source security, used routers leak info

NCSC warns of “new class” of Russian adversaries This warning from the UK’s National Cyber Security Centre highlights new risks seen over the last 18…

23 Beliefs About Cloud Security That Are Just Not True (Anymore)

The cloud has become a ubiquitous and essential part of our world, but just like every relationship in our lives, things change and inevitably become…

Cybersecurity News: Musk wants to develop TruthGPT, Southwest disrupted by ‘technical issue’, Officials warn hackers targeting Cisco routers

Elon Musk wants to develop TruthGPT On Tuesday, Elon Musk said in an interview with Fox News that he wants to develop his own chatbot…

We’d Secure Our Data If We Knew Where It Was

Given the ease of sharing data, our sensitive information is going more places than we want it. We have means to secure data, but you…

Cybersecurity News: LockBit on macOS, low code security, and QuaDream shuts down

Ransomware comes for macOS The massive LockBit ransomware operation traditionally designed its encryptors to target Windows, Linux and VMWare ESXi servers. However researchers at MalwareHunterTeam…

Cybersecurity News: Tax Day RAT warning, NCR POS outage, Urgent Chrome fix

Microsoft warns of Remcos RAT campaign targeting tax accountants Just ahead of U.S. Tax Day, Microsoft is warning of a new Remcos RAT campaign targeting…

Cybersecurity News Week in Review: Pentagon papers leak, keeping breaches quiet, Cisco air-gaps Webex

This week’s Cyber Security Headlines – Week in Review, April 10-14, is hosted by Rich Stroffolino with our guest, Dmitriy Sokolovskiy, CISO, Avid Cyber Security…

Cybersecurity News: Google Cloud’s weak passwords, pressure on breach disclosure, Discord cooperating on Pentagon leak

Weak passwords targeted on Google Cloud According to a report from Google Cloud’s Cybersecurity Action Team, weak passwords represented the root cause of almost half…

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

Security tools are supposed to do a job. Either they need to alert you, protect you, or remediate an issue. But they don’t always work…

Cybersecurity News: Windows Nokoyawa ransomware, LinkedIn pushes verification, Russia’s Ukraine cyberwar

Windows zero-day exploited in Nokoyawa ransomware attacks Yesterday’s summary of Patch Tuesday included CVE-2023-28252, which has been described as a privilege escalation flaw affecting the…

Cybersecurity News: Microsoft warns of Azure shared key abuse, Attackers hide stealer behind AI Facebook ads, OpenAI to launch bug bounty program

Microsoft warns of Azure shared key authorization abuse Researchers are warning that an Azure shared key authorization attack could allow full access to accounts and…

Our Security Tool Can Do Everything But Mitigate Risk

No department is immune to budget cuts. When the budget cuts come in, where can security look first to save money? Mike Johnson said, “An…

Cybersecurity News: Netherlands adopting RPKI, WordPress backdoor, tracing the Pentagon leak

Netherlands to adopt RPKI The Dutch government plans to transition to Resource Public Key Infrastructure standards by the end of 2024 in an effort to…

Cybersecurity News:  Apple zero-day updates, Flipper Zero ban, China Micron probe

Apple releases updates to address zero-day flaws Apple has released security updates for iOS, iPadOS, macOS, and Safari web browser to manage two zero-day flaws…

Cybersecurity News Week in Review: North Korea hacks 3CX, DISH ransomware lawsuits, Genesis Market seized

This week’s Cyber Security Headlines – Week in Review, April 3-7, is hosted by Rich Stroffolino with our guest, Rich Gautier, former CISO, Department of…

Cybersecurity News: Criminal records incident, Samsung’s ChatGPT leak, Money Message ransomware

Criminal records office pulls web portal due to ‘cyber security incident’ ACRO is the UK’s criminal records office responsible that manages criminal record information and…

What We Love About Working in Cybersecurity

We talk a lot on this show about what makes cybersecurity such a hard job, yet there are so many people who are in it…

Cybersecurity News: Spanish hacker arrested, UK offensive cyber principles, eFile malware

Prominent Spanish hacker arrested Spanish police arrested José Luis Huertas, known by the alias Alcaseca, believed responsible from multiple notable cyberattack in the country. Among…

Cybersecurity News: Genesis Market seized by police, Rorschach now the fastest ransomware encryptor, Tax software serving malware

Genesis Market platform seized by police On Tuesday, an FBI-led operation seized Genesis Market, one of the most significant online platforms where criminals sell stolen…

Join us in New Orleans 5-3-23 for CISO Series Podcast LIVE!

Our first trip to New Orleans, and we’re excited to participate in this year’s BSidesNOLA 2023 event with the closing keynote. We’ll be doing a…

No Need for Chaos Engineering Since Our Architecture Is Always Failing

Is chaos engineering the secret sauce to creating a resilient organization? Purposefully disrupt your architecture to allow for early discovery of weak points. Can we…

Cybersecurity News: TMX data leak, remote work security, WD network breach

TMX reveals customer data leak The consumer lending company TMX disclosed in a breach notification letter to the Office of the Maine Attorney General that…

Join Us in NYC for CISO Series Podcast on 4-13-23

Here’s a video preview of our CISO Series Podcast recording that will be happening in NYC less than two weeks before RSA in San Francisco!…