Automated Systems Only: Why CISOs Should Switch Off Their Dumb Machines

Cyber security is supposed to reduce risk and be cost effective at the same time. It’s supposed to take the burden of legwork away from the CISO and his or her team. It’s supposed to reduce the financial and reputational risk posed by malicious actors in an efficient, intelligent manner. What it’s not supposed to […]

Experts On Vistaprint Database Breach

Access to High-Value Company Information

Security researchers have identified an exposed database belonging to online printing giant, Vistaprint.  A spokesperson from Vistaprint has confirmed the unencrypted database exposed data from customers in the US, UK and Ireland. Vistaprint exposes customer data via unsecured database – #security #privacy #cloud — Nigel Gibbons (@NRG_fx) November 26, 2019

Black Friday Security Tips By Experts

With Black Friday and Cyber Monday coming up fast, here are security and privacy tips for online shopping from experts with KnowBe4 and Cequence Security.

Comments On Kids’ Smartwatch Leaking Location Data

AdBlocking and Adblocker Blocking

Security researchers found that a cheap smartwatch made in China for children, called M2, was exposing the personal details and location information of more than 5K children and their parents. This is particularly timely with holiday shopping in full swing.

Commentary On DeathRansom From AT&T Alien Labs

As part of our expert comment series, please find below commentary from an AT&T Alien Labs researcher on a new strain of ransomware called DeathRansom, which, according to Bleeping Computer, is beginning to make a name for itself. Passing along the below commentary in case you’re covering the ransomware now or in the future when an […]

The Most Dangerous Software Errors Of 2019: More Evidence Of History Repeating

The amazing community at MITRE recently published their list of the CWE Top 25 Most Dangerous Software Errors affecting the world in 2019. This list isn’t opinion-driven, it is the result of multi-faceted analysis utilizing the work of organizations like NIST, as well as publicized Common Vulnerabilities and Exposures (CVE®) data. In order to determine […]