All Posts

Understanding Your SaaS Responsibilities

Even though going to the cloud isn’t new, organizations often don’t know their responsibilities across various services. It doesn’t help that this changes based on…

Cybersecurity News: LinkedIn accounts hijacked, Chinese spies hack US congressman’s email, US watchdog plans to regulate data brokers

LinkedIn accounts hacked in widespread hijacking campaign On Tuesday, a wave of LinkedIn user reports surfaced indicating their accounts had been locked out or hijacked…

5 Years Required to Write a Better Job Description

We’re seeing increasing recognition that cybersecurity jobs should focus on competency rather than years of experience. But how do you create job posts to encourage…

Cybersecurity News: Moovit bug, Black Hat’s NOC, DDoS origins

Moovit bug allowed for free rides Security researchers with SafeBreach disclosed a bug in the popular Intel-owned transformation app Moovit. Using a chain of exploits,…

Are CISOs the CFOs of IP?

We’ve seen a lot of security concerns around the use of generative AI tools, particularly around data leaks. These new technologies provide challenges around how…

Cybersecurity News: Ford WiFi vulnerability, Government reviews Azure hack, TripAdvisor ransomware

Ford says cars with WiFi vulnerability still safe to drive The Ford Motor Corporation is warning of a buffer overflow vulnerability in its SYNC3 infotainment…

Cybersecurity News Week in Review: Tampa Hospital breach lawsuit, bank chat app flap, AI gets banned

This week’s Cyber Security Headlines – Week in Review, August 7-11, is hosted by Rich Stroffolino  with guest, Michael Woods, CISO, GE Cyber Security Headlines…

Cybersecurity News: CISA’s .NET warning, Compellent exposes VMWare, DEFCON AI challenge

CISA warns organizations of exploited vulnerability affecting .NET, Visual Studio CISA has added a zero-day flaw affecting Microsoft’s .NET and Visual Studio products to its…

Create A Pipeline of Cyber Talent

The demand for cybertalent is sky high. It’s very competitive to get those people with key skills. What if you were to train your staff…

Cybersecurity News: AI Cyber Challenge, eavesdropping typing app, Android cellular security

AI Cyber Challenge announced at Black Hat Officials with the Biden administration launched the DARPA-led initiative at the event. Over the next two-years, this will…

Cybersecurity News: Google’s Messages app now encrypts chats, Electoral Commission apologizes to UK voters, Banks hit with $500 million in fines

Google’s Messages app now uses RCS to encrypt chats On Tuesday, Google announced that its Messages app is now more secure and robust with Rich…

When Do I Fix the Toilet Myself or Call the Plumber?

For some security problems, it can be tough to know when to try to fix the problem yourself or turn to a vendor. Deciding this…

Cybersecurity News: K-12 cyber initiatives, Russian missile contractor breached, LLMs getting worse

White House rolls out school cyber initiatives It’s no secret that cyber attacks against educational institutions have increased over the past few years. We’ve covered…

CISO Series Podcast LIVE in Nashville 09-2023

We’re very excited to be joining the 2023 Global CISO Executive Summit hosted by Evanta in Nashville this year. We were at the 2022 Global…

Cybersecurity News: Tenable smacks Microsoft, hospital ransomware attacks, accurate acoustic spyware

Microsoft resolves vulnerability following criticism from Tenable CEO Microsoft has now resolved the Azure AD vulnerability. Amit Yoran, CEO of cybersecurity firm Tenable, published a…

Cybersecurity News Week in Review: All CPUs leak data, IDOR vulnerability warning, Israel refinery cyberattack

This week’s Cyber Security Headlines – Week in Review, July 31-August 4, is hosted by Rich Stroffolino with guest, Jeff Hudesman, CISO, Pinwheel Cyber Security…

Cybersecurity News: Fortinet tops vuln list, malicious Chrome Rilite, more Ivanti issues

Fortinet VPN bug tops CISA’s list of most exploited vulnerabilities in 2022 The most exploited vulnerability of last year was actually disclosed back in 2018…

Who Is the Best Hacker? – International Cybersecurity Championship

Cybersecurity events never come to San Diego, but we got one! The International Cybersecurity Championship, a four-day Capture the Flag competition for 18-25 year olds…

CISO Series Podcast LIVE in Washington, DC 09-2023

We’ll be the closing entertainment of the Convene conference, a full day event about security awareness at the Watergate Hotel in Washington, DC. Event will…

Improving Adoption of Least Privileged Access

What are we doing to improve access management? Make it too loose and it’s the number one way organizations get breached. Put on too many…

Cybersecurity News: Australia considers WeChat ban, US company aiding APTs, Veilid coming to DEF CON

Australian Senate recommends banning WeChat The Australian Senate’s Select Committee on Foreign Interference recommended banning all Chinese social media apps in the country, including the…

Cybersecurity News: Musk sues disinformation researchers, Cloud host found facilitating state-backed cyberattacks, UK spy agencies want to relax ‘burdensome’ AI laws

Musk sues disinformation researchers for driving away advertisers The company formerly known as Twitter is suing the Center for Countering Digital Hate, that researches hate…

Cyber Advice So Generic, You’ll Assume It Came from ChatGPT

Shifting Left is so five years ago. Advice and best practices are great, but context is king. Is there a mixture of best practices AND…

Cybersecurity News: National plan for cyber education, DeFi code exploit, study on cyber insurance

White House releases National Cyber and Workforce Education Strategy  According to the Office of the National Cyber Director, this new strategy will seek to create…