(844) 773-7734 mk@mkss.us

News

Microsoft: Two New 0-Day Flaws in Exchange Server

Microsoft: Two New 0-Day Flaws in Exchange Server

Microsoft Corp. is investigating reports that attackers are exploiting two previously unknown vulnerabilities in Exchange Server, a technology many organizations rely on to send and receive email. Microsoft says it is expediting work on software patches to plug the...
Fake CISO Profiles on LinkedIn Target Fortune 500s

Fake CISO Profiles on LinkedIn Target Fortune 500s

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may...
Cyber Insurance and the Attribution Conundrum

Cyber Insurance and the Attribution Conundrum

Written by Martin Lee and Richard Archdeacon. Lloyds of London have recently published a Market Bulletin1 addressing the wording of cyber insurance policies to exclude losses arising from: “state backed cyber-attacks that (a) significantly impair the ability of a...
Cyber Insurance and the Attribution Conundrum

Threat Trends: Vulnerabilities

Explore the nature of vulnerabilities in this episode of ThreatWise TV. It’s shaping up to be another big year for vulnerability disclosure. Already the number of Common Vulnerabilities and Exposures (CVEs) disclosed has crossed 18,000 and it’s on track to make this...
Cyber Insurance and the Attribution Conundrum

Managing Cybersecurity Risk in M&A

As Technology Audit Director at Cisco, Jacob Bolotin focuses on assessing Cisco’s technology, business, and strategic risk. Providing assurance that residual risk posture falls within business risk tolerance is critical to Cisco’s Audit Committee and executive...