Remove cyber-risk mitigating-cyber-risk-while-we-re-still-working-from-home
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

We talked at length about many issues, including supply chain security, and I asked Sager whether he’d heard anything about rumors that Supermicro — a high tech firm in San Jose, Calif. Below are some excerpts from our conversation. The attacker in this case has a risk model, too. National Security Agency.

Security 206
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance were seeing as a result. So they’re often unprepared when a nation state APT choses to focus on them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

IT 52
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow. There’s been a major data breach, and you’re booked on the next night flight out, at 6am. In a moment, I’ll introduce you to someone who is thinking about that problem and actively working to resolve it.

Cloud 40
article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Like SolarWinds and Colonial Pipeline, Miami-based software vendor, Kaseya, was a thriving entity humming right along, striving like everyone else to leverage digital agility — while also dodging cybersecurity pitfalls. From there, the malware began encrypting files on the victim’s machine. This attack was very fast.

article thumbnail

The Biggest Lessons about Vulnerabilities at RSAC 2021

eSecurity Planet

Last week’s RSA Conference covered a litany of network security vulnerabilities, from developing more robust tokenization policies and to addressing UEFI-based attacks, and non-endpoint attack vectors. Also Read: Remote Work Security | Top Priorities & Projects for 2021. Yet, that’s precisely the predicament.