Articles By This Author

News

Keeping Digital Assets Safe in the Expanding World of Cryptocurrency

Recent high-profile news about growing acceptance or rejection of cryptocurrencies has huge implications for global financial models of the future. Financial companies and others have

News

Tight-Lipped Threat Actors Making Five Figures Selling Enterprise Network Access On Underground Forums

Threat intelligence firm IntSights analyzed cybercrime underground forums and discovered that some threat actors preferred selling network access to third parties for up to five figures instead of exploiting

News

Hamburg DPA Says Zoom Is Not Compliant With GDPR Due to U.S. Data Transfers, No Longer Allowed for State Government Agencies

The outcome of the Schrems II ruling last year continues to plague tech companies operating in Europe, with Zoom the latest to find itself in

News

Current Administration Tackles Cybersecurity on a National Level

Cybersecurity is a significant concern in the US, especially after SolarWinds, an information technology firm, had a supply chain cyber attack, which later infected their

News

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

Most ransomware attacks begin with a compromised employee email account, something that in turn happens through some combination of phishing and social engineering. An enterprising

News

Cyber Attack on Crypto Exchange Liquid Results in Loss of $97 Million in Ethereum Tokens and Other Assets

Crypto exchange Liquid, one Japan’s most popular exchanges, is now short $97 million in total assets after a cyber attack that pulled funds directly from

News

Could Synthetic Data Be the Future of Data Sharing?

Synthetic data generation (SDG) is rapidly emerging as a practical privacy enhancing technology (PET) for sharing data for secondary purposes. It does so by generating

News

China’s New Data Protection Law Maintains Full State Access To Private Information, but Puts Clamps on Tech Firms Comparable to EU’s GDPR

A draft data protection law that sets terms similar to Europe’s General Data Protection Regulation (GDPR) is now set to go into effect in China

News

Supply Chain Vulnerability in Cloud Connectivity Platform Threatens 83 Million IoT Devices

A supply chain vulnerability in the ThroughTek “Kalay” network, a cloud-based communications platform used by an estimated 83 million Internet of Things (IoT) devices, could

News

Ransomware Is Too Easy for Criminals; Let’s Make It Harder

Russian hackers chose July 4th, America’s Independence Day, to launch the largest ransomware attack on record. Although their target was a US software company, the