Articles

Apple’s New CSAM tech is a big “no thank you”

Dangerous privacy-invasive tech needs some serious rethinking An opinion piece by Douglas James. Advancements in tech raise questions about protecting privacy. It’s critical, especially in these times, we protect our personal lives and data. Not only from a cybersecurity standpoint. Unless you’re comfortable with the idea of invisible hands sorting through your precious, personal info, …

Apple’s New CSAM tech is a big “no thank you” Read More »

New Bipartisan Senate Bill Creates Timeframe for Post-Cyberattack Reporting

What a new cyber bill could mean for critical infrastructure A bill introduced between members of the Senate (the Cyber Reporting Incident Act), specifically Gary Peters (Democrat, Michigan) and Rob Portman (Republican, Ohio) seeks to create a stricter timetable when reporting cybersecurity events. Specifically, after a breach regarding critical infrastructure. Owners and operators of enterprises …

New Bipartisan Senate Bill Creates Timeframe for Post-Cyberattack Reporting Read More »

The United States Will Hold a 30-Country Cybersecurity Meeting

International efforts begin to promote improved cybersecurity checks In a concentrated effort to improve cybersecurity efforts, the US is holding a 30-country meeting focused on cyber defense, threats, cryptocurrency scams, and more. The Biden administration looks to take aim at encouraging collaboration between countries, fighting cryptocurrency-based scams, and thwarting ransomware attacks. Biden’s statement also discussed …

The United States Will Hold a 30-Country Cybersecurity Meeting Read More »

Cybersecurity strategies to help you move forward

The fundamentals for building a secure business model It’s important to not rely entirely on external forces to protect you from today’s cyber threats. A good cybersecurity plan bases itself on strong practices, good cybersecurity hygiene, and competency. That’s why your organization should approach cybersecurity with several steps we’ll list below. Remember, proactive cybersecurity isn’t …

Cybersecurity strategies to help you move forward Read More »

Microsoft security hunts down phishing-as-a-service schemes

Phishing attack kits are around the corner Phishing and social engineering attacks are already a headache. As the most successful delivery method for injecting malware and ransomware, hackers readily use phishing tactics for their operations. Unfortunately, threat actors are stepping up their game with the use of PaaS, or “phishing as a service” kits. In …

Microsoft security hunts down phishing-as-a-service schemes Read More »