Banks not learning from their oversights: Phishing rules!
A bank robber, after being apprehended, years ago was asked: “Why did you rob the bank?” The simple and direct response was, “That’s...
Hey, those are my credentials!: MyHeritage Compromise
Attackers are consistently looking for the crown jewels of a business to exfiltrate. Generally, data tends to be the prime target with...
Naval AI Application: Unmanned Submarines
AI is a massively growing field in this nation and abroad. There are a few fields this is not applicable to. The application itself...
Consumers Targeted Again: Android Phones with Pre-Loaded Malware
Generally, when a consumer purchases their new smartphone, the routine is set. The phone is purchased, the consumer is rather exuberant,...
Connect with your InfoSec department.
With any project involving IT assets, there is a process to have the plan/process approved. This procedure is in place to keep the...
Atlanta: Issues, Part II
The city of Atlanta operations had been severely crippled in March 2018, arising from a rather serious and in-depth ransomware attack....
California’s Version of GDPR: Applicable to Consumer Embedded Systems?
California recently passed an aggressive data privacy law. The California legislature passed AB375 (The California Consumer Privacy Act...
Please investigate third party vendors with any computer or network access
Over the last five years there have been many, many corporate data breaches. These have been published and republished numerous times....
Technology Advancement Tempered with Prudence
Technology is advancing at such a fantastic rate. The pace at time is difficult to manage. These advances have the distinct possibility...
Another tool for monitoring insider risk
The risk to an organization is manifested in many different packages and from many sources. One particularly poignant area of potential...

