Article Reviews

NIST Continues The Search For Post-Quantum Encryption

With the potential to break all existing forms of encryption, quantum computing poses a unique challenge… An article review. While quantum computing has been a buzzword for some time now the technology remains largely theoretical, with small scale proofs-of-conce...

Industrial Technology Cybersecurity Concerns Persist

Over 85 percent of surveyed companies report having no  centralized monitoring of networked industrial devices… An article review. If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant ...

Global Cybersecurity Agencies Release List of Most Exploited Vulnerabilities

The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulne...

Pandemic Woes Add To The Cybersecurity Job Retention Struggle

According to a new survey, more organizations than ever are reporting problems with cybersecurity staffing… An article review. While pandemic related mandates and restrictions are gradually being lifted across the country, many organizations are still feeling the...

Cyberattack Reporting Comes To More Businesses

New legislation would require businesses in several new sectors to report cyberattacks within 72 hours… An article review. Following a number of recent high-profile incidents, and as fears of a Russian cyberattack grow, the Senate passed legislation that would re...

Survey Reveals Why Employees Violate Cybersecurity Policies

Stress, not malice, is implicated in the majority of violations… An article review. Following a surge of high profile attacks in 2020, businesses have been increasing their investment into cybersecurity.  However, many organizations are learning that investing in...

New Report Highlights Changing Phishing Trends

Millions of phishing emails will get through automated defenses this year, are your employees ready? An article review. With cybersecurity threats such as cryptocurrency miners and ransomware seeming to dominate the news, it can be easy to forget about older threats suc...

UK Government Contributes to Stolen Password Database

Following the contribution, Have I Been Pwned will host more than 800 million compromised credentials… An article review. Have any of your login credentials been revealed in a breach?  If you’re unsure about that, Have I Been Pwned (HIBP) can help you out b...

Regulators Approve New Cybersecurity Reporting Rules

New changes will decrease the amount of time an organization has to report incidents to regulators and customers… An article review. Citing the increasing frequency and pace of cyberattacks in recent years, the FDIC, Federal Reserve Board of Governors and the OCC...

CISA To Study School Cybersecurity Risks

President Biden recently signed a bill tasking the agency with evaluating the unique risks that schools face… An article review. Taking note of the unique challenges educational institutions face in securing their networks, President Biden has signed a bill into l...