My Blog
here is a description for my blog page
Boards have a unique role in helping their organizations manage cybersecurity threats. They do not have day to day management responsibility, but they do have oversight and fiduciary responsibility. Don’t leave any questions about critical vulnerabilities for tomorrow. Asking the smart questions at your next board meeting might just prevent a breach from becoming a total disaster. In this article we offer 7 questions to ask to make sure your board understands how cybersecurity is being managed by your organization. Simply asking these questions will also raise awareness of the importance of cybersecurity, and the need to prioritize action.
17 TRICKS ABOUT ACTIVE DIRECTORY UPDATES YOU WISH YOU KNEW BEFORE
SLEEPING WITH THE ENEMY ; COMMON SENSE IS UNCOMMON - ISRO & OPPO + XIAOMI It was with disbelief and horror that I read the news article in the Times of India (referenced at the bottom of this blog post) pertaining to the agreement between ISRO and OPPO (a Chinese Mobile manufacturer). The agreement in question pertains to sharing of technical information by Indian Space Research Organisation (ISRO) with OPPO to create applications and alerts for warnings in emergency in rural and coastal areas. A similar agreement was signed by ISRO with XIAOMI in 2020 itself.
In July 2021, KELA observed threat actors creating multiple threads where they claimed they are ready to buy accesses and described their conditions. Some of them appear to use access for deploying info-stealing malware and carrying out other malicious activities. Others aim to plant ransomware and steal data. KELA explored what is valuable for threat actors buying accesses, especially ransomware attackers, and built a profile of an ideal ransomware victim.
Understanding the Adversary: How Ransomware Attacks Happen - The 5 Stages Of A Ransomware Attack