Key Changes in the AG’s Updated Proposed CCPA Regulations

Key Changes in the AG’s Updated Proposed CCPA Regulations

The California Attorney General released an update to its proposed California Consumer Privacy Act Regulations, and companies have until 5 pm PT on February 24 to submit comments on this updated draft ...

Another Boeing Software “Glitch”

How I hate the word “glitch,” which is commonly used to describe faulty software in press reports, blogs, and the like. In my opinion, it trivializes serious software errors. So, when the ...

Rethinking Endpoint and Mobile Security for Remote Workers

With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling enables remote ...
DevOps and Securing Applications - PSW #632

Security Weekly Panel Discussion on DevOps

Security Weekly, recognized by their “Hack Naked” branding and weekly podcasts that thousands of people consume on many different aspects of Information/Cyber Security, is often a great resource for understanding problems. Are ...
Introducing CQ botDefense SaaS

Introducing CQ botDefense SaaS

Many of our customers are digitally transforming their legacy applications to deliver a more modern, feature-rich user experience for their customers, partners and employees. Such modernized applications are often microservices-based and run ...

Y2K … Two Decades Later

Why didn’t I use the title “Y2K at Twenty” for this column to match “The FS-ISAC at Twenty” that was posted on BlogInfoSec on January 6, 2020? Good question … easy answer ...

Old Habits Die Hard: Industrial Controls, Credential Sharing and Password Spraying

For years, the security implications related to Industrial Control Systems, SCADA and Industrial Internet of Things have been treated as a low(er) priority because these systems were closed, embedded deep in the ...

The FS-ISAC at Twenty

The FS-ISAC (Financial Services Information Sharing and Analysis Center) was launched in October 1999 by Treasury Secretary Lawrence Summers. It was the first such entity. Many subsequent ISACs have used the FS-ISAC ...

The Cyber Tipping Point—Are We There Yet?

As known cyberattacks are being reported as increasing in number, frequency and severity, you have to ask whether we are reaching, or have already reached, a tipping point where everyone gets so ...

The Rise & Fall of Single Request Bots

The cat and mouse game between bot operators executing automated attacks and prevention vendors has become increasingly sophisticated, with each side applying more intelligence to their respective prevention or malicious efforts. Prevention ...