News

  • Exploring influences on SSC grades for insurance companies

    This blog was written by an independent guest blogger. There are more online stores and services available than ever, and you are able to shop for almost anything online whether it’s groceries or insurance. There are many ways to protect yourself while browsing the internet, and one of those ways is to choose reputable businesses…

    Read More

  • Microsoft’s Pluton security processor tackles hardware, firmware vulnerabilities

    While this year’s Consumer Electronics Show was impacted by COVID, it didn’t stop Lenovo from announcing the first Microsoft Pluton-powered Windows 11 PCs. First announced in 2020, the Pluton is a security processor that Microsoft developed in partnership with AMD and Qualcomm to provide what they called “chip to cloud” security. Pluton is designed to…

    Read More

  • Russian cyberattacks on Ukraine raise IT security concerns

    This past week has seen an inundation of notifications concerning Russia’s overt and covert efforts to set “their” stage to provide it with a pretext to invade Ukraine once again. The realpolitik of the Russian efforts and the media focus is on the likelihood of Russia taking this course of action. These preparatory actions include…

    Read More

  • How chaos engineering can help DevSecOps teams find vulnerabilities

    The words “chaos” and “engineering” aren’t usually found together. After all, good engineers keep chaos at bay. Yet lately software developers are deploying what they loosely call “chaos” in careful amounts to strengthen their computer systems by revealing hidden flaws. The results aren’t perfect – anything chaotic can’t offer guarantees– but the techniques are often…

    Read More

  • Nine-year-old kids are launching DDoS attacks against schools

    Britain’s computer crime cops are targeting youngsters as young as nine years old in an attempt to dissuade them from embarking on a life of cybercrime. Read more in my article on the Hot for Security blog. Read More

    Read More

  • CIS Risk Assessment Method (RAM) v2.1 for CIS Controls v8

    CIS recently released the CIS Risk Assessment Method (RAM) v2.1, a risk assessment method designed to help enterprises justify investments for implementing the CIS Critical Security Controls (CIS Controls). This version supersedes CIS RAM v2.0, which was first released in October 2021. CIS RAM helps enterprises define their acceptable level of risk, and then manage…

    Read More

  • How to Protect Your Social Media Accounts

    Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you…

    Read More

  • McAfee Wins Product of the Year for Best Online Protection

    You can feel even more confident that you’ll enjoy life online with us at your side. AV-Comparatives has awarded McAfee as its 2021 Product of the Year. McAfee makes staying safe simple, and now this endorsement by an independent lab says we protect you best. Over the course of 2021, AV-Comparatives subjected 17 different online…

    Read More

  • UK Government to Launch PR Campaign Undermining End-to-End Encryption

    Rolling Stone is reporting that the UK government has hired the M&C Saatchi advertising agency to launch an anti-encryption advertising campaign. Presumably they’ll lean heavily on the “think of the children!” rhetoric we’re seeing in this current wave of the crypto wars. The technical eavesdropping mechanisms have shifted to client-side scanning, which won’t actually help…

    Read More

  • When It comes to Cybersecurity – An ounce of prevention

    Benjamin Franklin advised fire-threatened Philadelphians in 1736 that, “An ounce of prevention is worth a pound of cure. Clearly, preventing fires is better than fighting them……” So, to what extent are we able to protect ourselves from Cybersecurity events? With the alphabet soup of acronyms out there such as NIST, ISO, SOC, CISA, DevSecOps, etc………

    Read More