Who Is Responsible For Cyber Attacks? CEO or CIO?

Technewsworld has an interesting article: Cybersecurity Conundrum: Who’s Responsible for Securing IoT Networks? I do not want to focus on the IoT(Internet of Things) angle, instead pointing the spotlight  at the responsibility of the Cyber breach (assuming they get breached): {Global research and advisory firm Gartner predicts that, by 2024, 75 percent of CEOs will … Read more

Patching Anomalies Causing Security Problems

Zerologon Patches Roll Out Beyond Microsoft What if you have an older server? Like a Windows Server 2008? The Zerologon was a problem that was patched in August on a patch Tuesday of course. Race to patch as Microsoft confirms Zerologon attacks in the wild article also from ComputerWeekly.com Bottom line is that the vulnerability … Read more

Complacency and Cybersecurity Awareness

Are we being too complacent in our feeling of “nothing will happen to us” with regard to Cybersecurity? 2 stories tie this theme together: Phishing awareness training  wears off after a few months Apparently retraining is required after 6 months. Ransomware and Observations from Recent IR investigations Businesses are still getting ransomware, not how it … Read more

Cybersecurity Must be Attended to Or? Can the Unthinkable Happen to You?

Should Cybersecurity have some attention if you have not been hacked before? Does your business really need  more Cybersecurity awareness? I.e. So What… Cybersecurity!!! Is this what you are thinking? That does not matter to me ? I guess if this is your default thinking after every new headline of Breaches and attacks… For example … Read more

Are DeepFakes something to Worry About?

Deepfakes are  computer generated images and footage of real people. I.e. a computer generated images or video from a program (or algorithm).  FireEye has a paper that discusses this phenomenon: https://www.fireeye.com/blog/threat-research/2020/08/repurposing-neural-networks-to-generate-synthetic-media-for-information-operations.html? Instead of talking theory and what happens once the cat is out of the bag, let’s give some good examples: https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402 “Criminals used artificial … Read more