Author: Pete Hoff
While ransomware can be extremely destructive, there have also been some fascinating, if not slightly amusing use cases. For example, seven years ago hackers demonstrated ransomware for IoT thermostats, and a drone hacked smart lightbulbs from outside the window. Much more recently, court systems throughout Kansas will likely operate on paper for at least 2… Read more »
AI has been used in security applications for years, in particular monitoring SIEMS and orchestration efforts to secure systems during an attack. However with continuing innovations such as User Behavior Analytics (UBA), the use of AI in cybersecurity will go much further. The potential applications of AI in security are as far-reaching as the uses… Read more »
We’ve all seen them shared on social media: “Take this fun online quiz! Only 10% of people can get these Qs right!” But if a quiz asks for personal details, such as the name of the street you grew up on, X-out promptly. It’s likely to be a phishing scam to obtain your passwords via… Read more »
Updated November 14, 2024 As we wrote in a recent blog, no business is immune to cybersecurity threats. Cybersecurity risks are now higher than they’ve ever been, and lower than they ever will be. But you can’t mitigate risks until you know what they are. You can’t fix problems you’re not aware of. Like a… Read more »
Acknowledging the reality that “the cloud” is merely computers owned by someone else might make it seem simple, and not particularly innovative or important. But the truth is that offloading the substantial effort of managing compute infrastructure brings huge advantages to organizations. We’ll briefly touch on a few. Cost Savings + Pay-Per-Use With cloud computing,… Read more »
Fortunately, many phishing attacks are easy to spot. A strangely formatted email requesting that you reset your Amazon password, sent to an email address you have no Amazon account associated with is obviously fraudulent. Unfortunately, hackers continue to innovate, and many attacks aren’t so easily spotted. For example, just a few months ago, I received… Read more »