Similar Posts
Will You be the Last to Know?
External attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
CUI and GPTs
Okay, that is a bit of alphabet soup. CUI stands for Controlled Unclassified Information. While technically, it only refers to government agencies and government contractors, think of it as information you might prefer that the Russians, Chinese and your competitors don’t have. GPT stands for generative pretrained transformers like ChatGPT, Bard and many others. It…
DoJ (CMMC) False Claims Lawsuit Against Georgia Tech
In 2021 the DoJ announced the Civil Cyber Fraud Initiative to go after companies that lie about their cybersecurity practices. Under the False Claims Act, the government can recover damages and more. The “damage” could be as simple as we would not have given you the contract if we knew that you were not complying…
Security News Update for December 1, 2024
This week’s news includes:
Security News Update for March 2, 2025
This week’s news includes”
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…