Hear Shawn Tuma interviewed on News Radio 570 KLIF – Experts: Update Settings and Download Updates to Protect from “Meltdown” and “Spectre” CLICK HERE if you are impatient and only want to know what you should do ASAP to protect against Spectre and Meltdown With Y2K we had a warning. So much of a warning that…
Tag: Cybersecurity
Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV
Recently, news broke that in an effort to combat online revenge porn, Facebook is requesting that you send them your nudie pics! Here are some comments I shared with the Morning Dose television program:
Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene
Basic cyber hygiene has been a hot topic in cybersecurity, and for good reason. Most of the incidents that impact companies start with failures of basic cyber hygiene, not the super-sophisticated stuff of the movies. See Start with Cybersecurity Basics: Confirmed by Verizon’s 2016 Data Breach Report. One of the most fundamental rules of cyber hygiene is…
3 Legal Points for InfoSec Teams to Consider Before an Incident
As a teaser to my presentation at SecureWorld – Dallas last week, I did a brief interview with SecureWorld and talked about three of the points I would make in my lunch keynote, The Legal Case for Cybersecurity. If you’re going to SecureWorld – Denver next week, join me for the lunch keynote on Thursday (11/2)…
#CyberAvengers: A National Cybersecurity Action Plan is a Serious Priority
Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]
The #CyberAvengers Playbook (free download)
Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]
What do we in the United States really want from our cyber laws?
In my newsfeed are articles in prominent publications discussing the problems with the federal Computer Fraud and Abuse Act from very different perspectives. In the “the CFAA is dangerous for security researchers” corner we have White Hat Hackers and the Internet of Bodies, in Law360, discussing how precarious the CFAA (and presumably, the state hacking laws…
Checklist for Good Cyber Hygiene
October is National Cyber Security Awareness Month in the United States and you can check out lots of great content by going to #CyberAware on Twitter or to my team’s #CyberAvengers content. As my firm’s contribution to #CyberAware, I hope you find the following checklist to be helpful and all I ask of you in return…
Cybersecurity Is a Human Nature Problem
When we think of cybercrime, cybersecurity, cyber[fill-in-the-blank], we need to remember there are two components: (1) the cyber, and (2) the other. The cyber part simply refers to the tool that is used or the target that is attacked. And, for Heaven’s sake, please quit getting freaked out by the word “hack” — hacking means unauthorized access…
NIST Cybersecurity Guidance for Small Business Likely Forthcoming
The US House of Representatives has passed legislation similar to that recently passed by the Senate that would require the National Institute of Standards and Technology (NIST) to produce cybersecurity guidance that will be aimed at helping small businesses. The NIST Small Business Cybersecurity Act of 2017 would include NIST’s creating guidelines, tools, and best…
You must be logged in to post a comment.