Articles and Comments By Tim Mackey

Expert Commentary
OpenSSL Recent Vulnerability, What Experts Say?
November 08 , 2022 by Tim Mackey
How not to perform an incident response – OpenSSL CVE-2022-3602
Over the past several days, there...




































































































Expert Commentary
Supply Chain Attacks Or Vulnerabilities Experienced By 80% Of Organisations
October 28 , 2022 by Tim Mackey
The top level findings in this research are not at all surprising. Software supply chains are very c...




































































































Expert Commentary
Do You Think Businesses Must Do More To Boost Cyber Defences, Says Nadhim Zahawi
October 19 , 2022 by Tim Mackey
Improved cyber defences are more than just stronger firewalls or better educated employees. Mitigati...




































































































Expert Commentary
Cybersecurity Experts Welcome NSA/CISA Best Practices For Software Supply Chain
September 05 , 2022 by Tim Mackey
Developers play a key role in securing the software they create for their employers, but when that s...




































































































Expert Commentary
Expert On Report Showing 297% Increase In US Breaches Tied To Supply Chain And Third-party Suppliers
August 18 , 2022 by Tim Mackey
If we look at the history of data breaches, we’re likely to find that many can be classified as a...




































































































Expert Commentary
Major Cyber Bug In Log4j To Persist As ‘Endemic’ Risk For Years To Come
July 15 , 2022 by Tim Mackey
"Rarely do we get a comprehensive review of the impact and root causes of a cyber incident so quickl...




































































































Expert Commentary
Why Supply Chain Security Risks Provide Backdoor For Hackers And How To Prevent It, Experts Insight
April 08 , 2022 by Tim Mackey
Software supply chains are complex entities often comprising hundreds of “suppliers” per applica...




































































































Expert Commentary
Honda Bug Lets A Hacker Unlock And Start Your Car via Replay Attack
March 28 , 2022 by Tim Mackey
While owners of Honda vehicles impacted by CVE-2022-27254 might be understandably concerned over the...




































































































Expert Commentary
Comment: Chinese Spies Hacked A Livestock App To Breach US State Networks
March 09 , 2022 by Tim Mackey
It shouldn’t come as any surprise that nation-state actors would begin targeting other governments...




































































































Expert Commentary
Expert Reacted On 'Dirty Pipe' Linux Vulnerability
March 09 , 2022 by Tim Mackey
The Dirty Pipe vulnerability illustrates an inherent risk with all software development – code cha...




































































































Expert Commentary
Log4Shell Threat Far From Gone: Attackers Continue To Target Vulnerability
March 04 , 2022 by Tim Mackey
It’s not surprising that attackers continue to attempt to exploit a high profile vulnerability lik...




































































































Expert Commentary
Log4Shell Threat Remains Extremely High, Cyber Security Expert Insight
March 03 , 2022 by Tim Mackey
It’s not surprising that attackers continue to attempt to exploit a high profile vulnerability lik...




































































































Expert Commentary
Principal Security Strategist, Synopsys CyRC (Cybersecurity Research Center)