The Cybersecurity & Infrastructure Security Agency (CISA) reported that “collective effort to defend cyberspace. As ever, CISA remains committed to working with the industrial control systems (ICS) community to address both urgent operational cyber events and long-term ICS risk.”  The May 24, 2022 news release entitled “CISA’S ROLE IN

Continue Reading Cybersecurity to protect Critical Infrastructure is a top priority for the CISA!

McKinsey.com reported that “The emerging technology of quantum computing could revolutionize the fight against climate change, transforming the economics of decarbonization and becoming a major factor in limiting global warming to the target temperature of 1.5°C.”. The May 19, 2022 article entitled “Quantum computing just might save the planet&rdquo

Continue Reading Quantum Computing May Save the Planet!


HelpNetSecurity.com reported that “Zerto recently commissioned IDC to conduct a major ransomware and disaster preparedness survey, which revealed that 79% of respondents have activated a disaster recovery (DR) response within the past 12 months. 61% of these incidents were triggered by ransomware or other malware with 60% of organizations reporting

Continue Reading 79% of organizations activated a DR response in the past 12 months!


BusinessInsurance.com reported that “European Union countries and lawmakers agreed on Friday to tougher cybersecurity rules for large energy, transport and financial firms, digital providers and medical device makers amid concerns about cyberattacks by state actors and other malicious players.” The May 13, 2022 article entitled “EU toughens cybersecurity rules

Continue Reading Cybersecurity rules in the EU are now tougher!


Cointelegraph.com reported that “Bored Ape creator Yuga’s Otherdeed launch was the largest NFT mint ever,…Last week, 55,000 parcels of “virtual land” were sold on the Ethereum blockchain for more than $300 million, the largest nonfungible token (NFT) mint ever.”  The May 9, 2022 article entitled “Largest NFT mint ever:

Continue Reading Controversy Surrounds the Largest NFT Mint for “Virtual Land”!


NIST published the Special Publication 800-207 which “defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to

Continue Reading What Are You Doing for Zero Trust Architecture?


BankInfoSecurity.com reported that “New cyber incident reporting rules are set to come into effect in the U.S. on May 1. Banks in the country will be required to notify regulators within the first 36 hours after an organization suffers a qualifying “computer-security incident.”  The April 29, 2022 report entitled “

Continue Reading Will Banks Be Able to Comply With the New 36 Hour Cyber Notification Deadlines?


Reuters.com reported that “The United States and 55 other nations on Thursday signed a political commitment to push rules for the internet that are underpinned by democratic values, at a time when the U.S. has accused Russia of wielding internet disruptions as a part of its escalating attacks on Ukraine.”

Continue Reading U.S. endorses the Declaration for the Future of the Internet!


Darkreading.com reported that “While cybersecurity experts have been reticent to attribute the attacks to Russia, the links between their targeted and the current Russian invasion of Ukraine have suggested that the nation is the most likely sponsor. While the country might be hesitant to attack critical infrastructure, Russia has not

Continue Reading Beware of Cybersecurity Threats to Critical Infrastructure!


DataBreachToday.com reported that “commonly negotiated issues between healthcare delivery organizations and medical device vendors often involve expectations regarding notification of and patches for newly identified software security vulnerabilities, and those timelines.”  The April 18, 2022 article entitled “Medical Devices: Negotiating Cybersecurity Contract Terms” included these comments from Jim

Continue Reading What Are You Doing to Protect Your Medical Devices From Cyberattacks?