
Cyber Risk Update 30 DEC 2022
There are supply chain risks when we use cloud services: Two misconfigured AWS S3 buckets apparently belonging to McGraw Hill exposed...

Cyber Risk Update 23 DEC 2022
Supply Chain Risks - emergency services often rely on satellite communications. Suspected Russian Hackers Infiltrated U.S. Satellite...

Cyber Risk Update 16 DEC 2022
Data Breaches The County of Tehama, California, says personal information was compromised in a data breach. https://www.securityweek.com/...

Cyber Risk Update 9 DEC 2022
Governments do create vulnerable systems A website run by the Florida Department of Revenue had been exposing the personal data,...


The Strength of Collaboration: Working Together Can Help Protect Local Governments
The Strength of Collaboration: How Working Together Can Help Protect Local Governments and Critical Infrastructure from Cyber Threats (My...


The Livermore Valley Winegrowers Association Cybersecurity Presentation
The Livermore Valley Winegrowers Association Cybersecurity Presentation The presentation titled "Cyber Threats to Food and Agriculture"...


Managing Cyber Risks in Today's Digital Age: Insights from PwC Pulse Survey
In today's digital age, businesses face a myriad of risks that can disrupt operations and damage reputation. With the rapid pace of...

Cisco Router Sextortion Scam
Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco...

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...


Measuring Security Performance: 3 Techniques You Need to Know
Measuring security performance is critical for any organization to identify vulnerabilities, mitigate potential risks, and improve...