How Attorneys Are Harming Cybersecurity Incident Response

New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows victim firms to detect, contain, and recover from security incidents. It should ...

Protecting Cybersecurity Infrastructure During Mergers and Acquisitions

Cybersecurity due diligence for business consolidation Mergers and acquisitions (M&A) and divestitures are complex processes that require careful planning and execution. Cybersecurity is a critical (yet often overlooked) aspect of these transactions ...
Getting Started: Basic Personal Cybersecurity for Everyone (3 Easy Tips)

Getting Started: Basic Personal Cybersecurity for Everyone (3 Easy Tips)

| | introduction
This post was originally published on 10 MAY 2023; it has since been updated and revised. Welcome to the world of cybersecurity! This guide was written for complete cybersecurity and privacy novices ...
Ransomware Detection Using Hardware

Ransomware Detection Using Hardware

Computer processors get the final word when running programs. Can they judge bad code from good? Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection. All ...
I Tricked 2 Scammers Into Wasting 16 Hours - Ep. 1

Are Technical Support Scams Getting More Advanced?

| | csu, Phishing, security, tech support scams
Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals ...

Ukraine’s Response to Cyber Threats a Model in DDoS Prevention

With the disruption, loss of life and heartbreaking images that the Russia-Ukraine conflict has produced, it is easy to overlook what it has meant to the cyber threat landscape. Even threat actors ...
Digital Identities and Assets - David Mahdi, Sectigo

Techstrong TV: Understanding & Managing Digital Identities

David and Charlene discuss how to effectively manage digital identities and assets in the rapidly evolving digital world. The video and a transcript of the conversation are below. This is Digital Anarchist ...
Security Boulevard

How Do Black Hat Hackers Differ from White Hat Hackers?

| | Blog, email security
If you run a data-driven business, you likely have an informed idea about hackers. Most people usually link the term to shady actors lurking online. These are cybercriminals who are always looking ...

Apple’s Lockdown Mode

I haven’t written about Apple’s Lockdown Mode yet, mostly because I haven’t delved into the details. This is how Apple describes it: Lockdown Mode offers an extreme, optional level of security for ...

Five Eyes Cyber Security Predictions

| | csu, governance, security
What cyber threats the future brings to us? An analysis of the cybersecurity strategies of Canada, New Zealand, the UK, the US, and Australia. The post Five Eyes Cyber Security Predictions appeared ...