Similar Posts
Cyber Insurance – Hard to Get, Harder to Keep
If you have tried to get cyber risk insurance recently, you know that it is a whole new world. After years of collecting premiums, insurance companies have had to write checks. A lot of checks. They don’t like that so much. As a result, premiums have gone up, coverage has gone down, underwriting has become…
A Secure Replacement for Passwords
Passkeys will ultimately replace passwords. How soon is unclear because 2 billion websites need to be upgraded to support it and the vendors still have some kinks to work out. But it will happen and you need to learn about it and start playing with it. Learn more here:
Will You be the Last to Know?
External attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
What is the Shared Responsibility Model and How Does it Affect Me?
The shared responsibility model is the way that cloud service providers reduce their risk if something bad happens. For the most part, unless you have an unusual contract with your cloud service provider, if something bad happens, it is your problem. If you have not planned for this, you could be in deep yogurt. Learn…
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.
Banking Social Engineering Scams are Alive and Well
The easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…