Hacking the Hardware Brains of Computers is the Ultimate CyberattackCompromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading…1d ago1d ago
OneDrive’s New Sync May be a Privacy and Security NightmareThere are many cybersecurity and privacy risks to consider, both from the user and the enterprise, when it comes to Microsoft’s new…3d ago3d ago
PowerSchool Data Breach — Round 2 ExtortionsThe PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:6d ago6d ago
Microsoft Listens to Security Concerns and Delays New OneDrive SyncMisuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in…6d ago6d ago
Cyberattacks on Critical Infrastructures Can Be BrutalWe have all seen and heard of cyberattacks against various national critical infrastructures. It sounds menacing, but have we as…May 8May 8
Cyberattacks on Critical Infrastructures Makes Us Very VulnerableMany don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power…May 7May 7
The Fallacy of Perfect CybersecurityPerfect cybersecurity is not being impervious to attack! Rather, it is the optimal balance between the costs, friction it introduces, and…May 7May 7
Practical Cybersecurity Leadership for IT TeamsWe covered so many cybersecurity topics in last week’s Defendify webinar! Ex. Alignment with business objectives, importance of the basics…May 6May 6
Cyberwarfare Funding Accelerates and Everyone is at RiskNations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in…May 6May 6
Enterprises Most Vulnerable Cybersecurity Blind SpotsThe rapid adoption of AI brings cybersecurity concerns. The value of AI systems is predicated on the breadth of access the system possesses…May 6May 6