Author: Pete Hoff

While ransomware can be extremely destructive, there have also been some fascinating, if not slightly amusing use cases. For example, seven years ago hackers demonstrated ransomware for IoT thermostats, and a drone hacked smart lightbulbs from outside the window. Much more recently, court systems throughout Kansas will likely operate on paper for at least 2 […]

AI has been used in security applications for years, in particular monitoring SIEMS and orchestration efforts to secure systems during an attack. However with continuing innovations such as User Behavior Analytics (UBA), the use of AI in cybersecurity will go much further. The potential applications of AI in security are as far-reaching as the uses […]

We’ve all seen them shared on social media: “Take this fun online quiz! Only 10% of people can get these Qs right!” But if a quiz asks for personal details, such as the name of the street you grew up on, X-out promptly. It’s likely to be a phishing scam to obtain your passwords via […]

Fortunately, many phishing attacks are easy to spot. A strangely formatted email requesting that you reset your Amazon password, sent to an email address you have no Amazon account associated with is obviously fraudulent. Unfortunately, hackers continue to innovate, and many attacks aren’t so easily spotted. For example, just a few months ago, I received […]

As written in a recent Wursta blog, cybersecurity risks are currently higher than they’ve ever been, and lower than they ever will be. Every dollar spent on a service like vCISO is one less dollar you have to spend on something else, such as an upgraded firewall. Why then would a vCISO make sense?  It […]

This segment is the third in a series focused on adjusting the security controls of your business after COVID. This piece addresses staying vigilant and aware of current threats in a post-COVID world. Many organizations have begun shifting their workforce back into the office and reducing the remote worker risks. However, this appears to be […]