Syndicated Blog - Security Boulevard

Syndicated Blog

SecurityOrb.com
The Information Security, Digitial Privacy & Internet Safety Website…

U.S. Can Expect to see more Ransomware Attacks

In the cybersecurity space, there are many things we do not all agree on, but one thing I have noticed in the past year is that we all agree that the U.S ...

Bad Ending for Washington, D.C.’s Metropolitan Police Department (MPD) after a Ransomware Attack

A group of ransomware hackers known as “Babuk” leaked internal police files from the Washington, D.C. Metropolitan Police Department (MPD).  The information was stolen in late April.  The post Bad Ending for ...

Colonial Pipeline Ransomware Attack

One of the nation's largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack.  Ransomware is a form of malware that encrypts a victim's files. The attacker then ...

Ransomware attack leads to shutdown of major U.S. pipeline system

By: David E. Sanger A cyberattack forced the shutdown of one of the largest pipelines in the United States, in what appeared to be a significant attempt to disrupt vulnerable energy infrastructure. The ...
BNC Interview - STEM

The Cybersecurity Job Gap and How Getting Women in STEM can Help [Video]

As previously stated, Researchers at Cybersecurity Ventures detailed in a 2019 post there would be 3.5 million unfilled cybersecurity positions globally in 2021, but with the addition of 700,000 additional skilled practitioners ...

Social Media Safety Awareness Tips

Social media provides a way to stay connected and share with others, but did you know that the cyber criminals will also use social media as another technique to conduct their attacks.  ...
BNC Interview - Internet Safety for Kids Tips

Internet Safety Tips for Parent and Kids [Video]

In a recent interview on the BNC network, I provided a few tips to keep kids safe while online on the Internet.  ...

Supply Chain Risk Management (SCRM) Explained

Supply chain risk management (SCRM) is the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of IT products and service supply chain ...

Non-sensitive PII + Sensitive PII = Sensitive PII

| | FEATURED, pii, Privacy
Non-Sensitive PII together combined with Sensitive PII = Sensitive PII ...

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only.  This would allow our national security agencies to have access to the qualified, capable, and ...