JOINT CYBERSECURITY ADVISORY – PREVENTING WEB APPLICATION ACCESS CONTROL ABUSE

Click the link to access > joint_csa_preventing_web_application_access_control_abuse

Read more

CYBER RESILIENCE: PROTECTING PEOPLE AND DATA

7.26.23 > Lee Ann Villella Protecting people and defending data in the face of cyber threats is crucial based on trends and patterns that have emerged in the cybercriminal landscape. Several key factors include: Evolution of Cybercriminal Business Models: Cybercriminals have honed their strategies and now primarily focus on three profitable business models: ransomware, data […]

Read more

BECOMING A CYBER-AWARENESS CHAMPION

7.24.23 > Mark Ritchie I was sworn-in as Minnesota’s elected Secretary of State in January of 2007. During my first year in office, when I was still “learning the ropes,” I faced a challenge never considered in all my years of preparing to lead this office – a cyber-attack. Early one Monday morning I received […]

Read more

CYBER RESILIENCE IN A COMPLEX WORLD

6.28.23 > Rohit Tandon We live in a world full of surprises. Sometimes events around us go unnoticed, and at other times similar events have the potential to disrupt. Smart folks will develop predictive models of how a specific event can impact our world and are forever tuning these models for that elusive accuracy. For […]

Read more

IS MY DATA TRULY GONE?

6.26.23 > Rebecca Duvick I regularly get asked whether the data on equipment we receive as part of our electronics recycling program is truly gone after it’s wiped.  The answer, based on the processes we use, is yes!  Electronics recycling is an important but often overlooked aspect of cyber security.   With cyber risk around every […]

Read more

Tennessee’s New Privacy “Shield”: 3 Tips for Approaching the NIST Privacy Framework

6.21.23 > Jerrod Montoya There are now 10 comprehensive privacy laws enacted in the United States. The new laws in 2023 include those in Montana, Indiana, Iowa, Tennessee, and Texas. These laws join already existing laws including California, Utah, Colorado, Virginia, and Connecticut. These laws all share commonalities that resemble the EU’s Global Data Protection […]

Read more

The SEC’s Proposed Cybersecurity Rules: Is Your Company Ready?

6.14.23 > Phil Schenkenberg Here in the United States, companies face a patchwork of legal obligations that address information security and data privacy. For example, federal laws target certain market segments (such as health care, financial services, and education), state laws target certain types of information (such as personal financial or biometric information), and both […]

Read more

TAKING ON CYBER WORKFORCE CHALLENGES

6.7.23 > Tim Herman It is no secret that there is an ever-growing challenge with finding good people for the now nearly 750,000 open Cyber Security jobs in our country.  Companies are scrambling to find new and different ways to tackle this mountain.  We are still seeing an impact from the Great Resignation across the […]

Read more

CYBERSECURITY ADVISORY – PEOPLE’S REPUBLIC OF CHINA STATE-SPONSORED CYBER ACTOR LIVING OFF THE LAND TO EVADE DETECTION

6.1.23 > via InfraGard Cybersecurity Advisory – People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection Click this link to read the Cybersecurity Advisory > jca_actor_living_off_land

Read more

BEST IN CLASS

5.31.23 > Paul Hershberger I was recently engaged in a conversation with some colleagues in the cybersecurity industry and they posed a question along the lines of; ‘how do you define best in class’? I was really eager to dive into this one and confident that I had the answer, and it was going to […]

Read more

THE EVOLUTION OF MULTI-FACTOR AUTHENTICATION

5.24.23 > Brian Kenyon Multi-factor authentication is — thankfully — a normal part of our digital experience. Whether at work, connecting with your bank, or logging in to social media, we’re used to the extra step of entering a short code or acknowledging a push notification during login. Attackers are on the hunt In recent […]

Read more