US Senator Wyden demands that Microsoft be held accountable for the cloud services data theft…https://www.securityweek.com/us-senator-wyden-accuses-microsoft-of-cybersecurity-negligence/Jul 28, 2023Jul 28, 2023
Other challenges to brew the Perfect Storm: Rate of Change.Post II of: “Why we are losing the Cyberwar” (And what can we do about it).Jun 14, 2023Jun 14, 2023
Why we are losing the CyberwarPost I of: “Why we are losing the Cyberwar” (And what can we do about it).Jun 13, 2023Jun 13, 2023
BABUK, here we go again.I’ve read this morning in https://www.securityweek.com/new-babuk-based-ransomware-targeting-organizations-in-us-korea/ that a new group…May 17, 2023May 17, 2023
Budworm attacks again (allegedly)Budworm a.k.a APT27, Bronze Union, Emissary Panda, TG-3390, Red Phoenix, LuckyMouse; seems to have resurfaced again after several attacks…Oct 15, 2022Oct 15, 2022
An unbridled Twitter APICloudSEK has discovered that more than 10K apps were leaking API twitter data and a subset of 3207 apps were “leaking valid Consumer Key…Aug 3, 2022Aug 3, 2022
OT: Insecure-by-design?The CISA release of a cluster of 56 Industrial Controls Systems Advisories focuses on the prevalence of vulnerabilities caused by…Jul 4, 2022Jul 4, 2022
Cybersecurity trends: Cybersec Mesh ArchitectureHackers don’t think in silos, hackers look at your organization as a target domain. Therefore, your security standards must embrace the…Jun 23, 2022Jun 23, 2022
Ukraine Cyberwarfare: Main Threat Actors and attacks.I’ve read with keen interest this HBR article and I would like to add from a Threat Intelligence point of view a description of the main…Mar 9, 2022Mar 9, 2022
CISO Challenges: Controlling the narrative by means of a communication policyResearching the Ukrainian conflict, found this interesting article about the Russian propaganda and disinformation efforts. And…Mar 5, 2022Mar 5, 2022
CISO Challenges: Adapting to Black SwansI didn’t anticipated this unprecedented petition from the Ukranian Government. So I began to think on the potential intended (and…Mar 5, 2022Mar 5, 2022
CISO Challenges: Digital TransformationDT was a way to be on the forefront of the normal, but since the pandemic, has become the way to adapt to New-Normal, an unknown country…Mar 5, 2022Mar 5, 2022
CISO Challenges: Insider ThreatsI‘m a great fan of Frameworks because of their explanatory (and actionable) power and I recently found this beautiful graph that mindmaps…Mar 4, 2022Mar 4, 2022
CISO challenges: RansomwareThe threats associated with cybersecurity have become the principal driver of risk not only to IT functions but to the bussiness as a…Mar 4, 2022Mar 4, 2022
The rising costs of Ransomware attacksTaking in account that HSE didn’t pay the ransom it becomes abundantly clear that the main costs of a ramsomware attack are twofold…Mar 4, 2022Mar 4, 2022
CISA releases a new list of open-source security tools.One of the challenges of achieving a resilient security posture is the tech part of the trade, and this list, not only helps in that regard…Mar 4, 2022Mar 4, 2022