2 Stories About Zero-day Vulnerabilities Exemplify Need of Update Program

These 2 Vulnerabilities on Zero-day vulnerabilities have possibility of causing much mayhem unless you have cybersecurity program in place to deal with updates or patches as quick as possible and other Intrusion Detection as well as anti-virus and more. Hacker News has the stories:   RomCom Exploits Zero-day  The Russia-aligned threat actor known as RomCom has … Read more

Can Nvidia Technology Accelerate Computing 4x Every Year?

And what does it mean to Cybersecurity? As in the latest videos by Jason Huang the CEO of Nvidia where the Blackwell architecture and other pieces have been revealed with more detail: Blackwell is a very large GPU installation which has the capability of increasing computing power 4x every year.  As the image explains Blackwell … Read more

Why Humanity Denies Cybersecurity Needs!!

We are obviously in trouble because there are large numbers of people with inadequate Cybersecurity habits. How many computers get hacked every year?   I asked Claude AI: “How many computers or people get hacked every year in the USA?” According to statistics from the FBI and cybersecurity firms, hacking incidents affect millions of Americans annually, … Read more

Are We Still Waiting for Criminals to use AI to Attack?

I think you know the answer to that: United Nations Office on Drugs and Crime has found multiple areas in the world where there is a confluence of criminal gangs with drug trafficking sales, online gambling, and cyber-enabled attacks. And guess what these criminal gangs into drugs, online gambling, and cyberattacks are using to make … Read more

IT Governance May not be Sexy or Exciting, but Makes IT Easier Overall

How IT Governance Enhances Cybersecurity IT governance plays a crucial role in strengthening cybersecurity within organizations by ensuring that cybersecurity strategies are aligned with overall business objectives and risk appetites. This alignment is essential for effectively managing cybersecurity risks and ensuring that security measures support the organization’s goals.   (this IT governance explanation comes from a … Read more