Without limitations, the technology may pose a “profound risk” to society…
An article review.
Citing “profound risks to society and humanity,” a group of researchers, CEOs and technology leaders recently signed an open letter calling for a ...
The new plan calls for technology providers, and not end users, to be responsible for security…
An article review.
Following multiple high profile cybersecurity incidents in 2021 and 2022 the Biden Administration recently announced new long-term goals for the nat...
A draft version of the new framework may be available as early as this summer…
An article review.
As the cybersecurity landscape is constantly evolving, the tools we use to address risk need to evolve as well–and by this summer we should be getting our firs...
A relic of the internet’s less secure past, many small firms struggle to secure their email systems…
An article review.
With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be ea...
While we're not a news service, we often use current events to comment on trends and our services.
This blog is intended to get people thinking about topics and trends in Technology Risk M...
The cryptographic algorithm is vulnerable to attack and is no longer considered secure…
An article review.
NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectivel...
A new study highlights the benefits of looking at your network from the other side…
An article review.
If you were trying to attack your organization’s network, how would you start? That’s a question you may not have asked yourself, but experts say i...
Google Ads, Gitlab and OneDrive have been used to distribute the BATLOADER malware…
An article review.
We’ve always believed that “watch where you click” has always been good advice when it comes to security online, however Microsoft is tracking...
Microsoft, Cisco and Uber are among the companies hit by this new threat…
An article review.
As more organizations adopt multi-factor authentication to help safeguard their systems hackers have adapted, and several major corporations have been among those hit by ...
With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures…
An article review.
When working on cybersecurity awareness messages for your customers you may be in...