Insurance Occurrence Assurance?

The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a reactive measure whereas an effective security program is a proactive measure.

3 Summer Safety Reminders for Families

For many children, summertime is the best time of the year. No more school, ice cream and popsicles and – did we mention – no more school? However, if you are a parent, summertime presents more of a challenge. From trying to organize activities and bab…

Summer Safety and Security for Your Kids

Summer is here, which means you have to make the decision of whether or not your child is old enough to stay at home alone, while you are working or running errands. According to experts, most kids are ready to stay home alone by the time they are 12 o…

New World, New Rules: Securing the Future State

I published an article today on the Oracle Cloud Security blog that takes a look at how approaches to information security must adapt to address the needs of the future state (of IT). For some organizations, it’s really the current state. But, I like t…

MalwareTech Arrested Because Creating Kronos Banking Trojan

MalwareTech — the security researcher who stopped the WannaCry ransomware outbreak — was arrested in Las Vegas on accusations of creating the Kronos banking trojan together with another person.

The arrest — first reported by Motherboard — took place…

WannaCry Inspires Banking Trojan to Add Self-Spreading Ability

Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful.

Security researchers have now discovered at le…

Apple has removed all major VPN apps from Chinese App Store

China is well known for its online censorship and surveillance tactics, but earlier today news broke that Apple has removed all virtual private network (VPN) apps from App Store in China. This means Apple users in China can not avail online anonymit…

Hackers can take over Car Wash, trap you and smash your vehicle

It is understandable to receive Internet of Things (IoT) related warnings like vulnerable public WiFi or charging spots that can be hacked but a drive-through car wash? Well, it turns out Internet connected car washes or smart car washes can be hacke…