Article Reviews

New Attack Highlights the Importance of Logging

The incident may lead to Microsoft offering more logging options to customers without an additional fee… An article review. While the importance of maintaining and reviewing event logs has been common knowledge for some time, some vendors still require customers ...

NIST Proposes Changes to Outdated Guidance

An evolving threat landscape means the original 2015 guidance is in need of an update… An Article Review. The National Institute of Standards and Technology (NIST) is considering an update to its 2015 Special Publication 800-171, which contains cybersecurity cont...

Experts Warn of AI Cybersecurity Risk

New tools could allow unskilled attackers to launch increasingly sophisticated attacks… An article review. Imagine a world where you receive a call from your boss asking you to assist them with something… only it’s not your boss, but an AI being used ...

Experts Call For Limits On AI Research

Without limitations, the technology may pose a “profound risk” to society… An article review. Citing “profound risks to society and humanity,” a group of researchers, CEOs and technology leaders recently signed an open letter calling for a ...

Biden Administration Unveils New Cybersecurity Strategy

The new plan calls for technology providers, and not end users, to be responsible for security… An article review.  Following multiple high profile cybersecurity incidents in 2021 and 2022 the Biden Administration recently announced new long-term goals for the nat...

NIST Prepares Updates To Cybersecurity Framework

A draft version of the new framework may be available as early as this summer… An article review. As the cybersecurity landscape is constantly evolving, the tools we use to address risk need to evolve as well–and by this summer we should be getting our firs...

Aging Email Platforms Represent a Growing Risk

A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be ea...

Our Blog Policy

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog arti...

NIST Announces Retirement of SHA-1

The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectivel...

Think Like a Hacker: The Importance of The Red Team

A new study highlights the benefits of looking at your network from the other side… An article review. If you were trying to attack your organization’s network, how would you start?  That’s a question you may not have asked yourself, but experts say i...