Europe Says

europesays.com/2006415/ As the trade war escalates, Hence launches an AI ‘advisor’ to help companies manage risk #business #exclusive #HenceAi #RiskManagement #tariffs #TradeWar

LMG Security

How your team responds to a data breach can make a $1.5 million difference in damages. In our latest blog, Security Consultant Derek Rowe answers frequently asked questions about critical incident response training. This FAQ covers everything from what to look for in a class and how to grade your IT training maturity, to how IT training impacts compliance and BCDR.

Don’t wait for an attack to find out how prepared your team is. Read the blog: lmgsecurity.com/critical-incid

#Cybersecurity #DFIR #Training #IncidentResponse #IncidentResponseTraining #CyberThreats #DataBreach #Infosec #CISO #RiskManagement #Cyberaware #SMB #CEO #CIO

Critical Incident Response Training: Your Top Questions Answered | LMG Security

Get answers to your top questions about critical incident…

LMG Security
LMG Security

Register for Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now!

Quantum computing is on the horizon, and it has the potential to revolutionize the way we think about cybersecurity. Join our April 23rd live session where cybersecurity experts @sherridavidoff and @MDurrin will dive into the implications of quantum technology on encryption and data security. Learn what steps security leaders should take today to prepare for this disruptive shift.

Don’t miss out on this opportunity to ask questions and stay ahead of emerging threats. Register now!

lmgsecurity.com/event/cybersid

#QuantumComputing #Cybersecurity #Encryption #CybersideChats #CISO #infosec #CIO #CEO #Cyberaware #ITsecurity #Riskmanagement #CybersecurityInsights #Tech #Cyber

Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now | LMG Security

In this quick, high-impact session, we’ll dive into…

LMG Security
Brian Greenberg

⚠️ The backbone of vulnerability tracking may be about to snap. 🤦🏻‍♂️

MITRE’s federal contract for managing the CVE program expires April 16 — with no confirmed renewal.

Without it, we risk:
🚫 A breakdown in standardized vulnerability tracking
🌍 Global coordination gaps
💣 Increased exposure to unpatched threats

Cybersecurity doesn’t work without CVE. Leadership must step up before this vital resource goes dark.

#CyberSecurity #CVE #RiskManagement #Vulnerabilities #Leadership
theverge.com/news/649314/cve-m

The CVE program for tracking security flaws is about to lose federal funding

The federally funded organization behind the Common…

The Verge
LMG Security

Heading to RSA Conference 2025? Let’s connect!

Let’s grab a coffee and chat about today’s biggest cybersecurity challenges! lmgsecurity.com/contact-us/

We also invite you to join @sherridavidoff & @MDurrin's must-see sessions:

Session 1: From Leak to Breach – How Hackers Use AI to Exploit Stolen Source Code | April 28, 9:40 AM

Session 2: Deepfake Cyber Extortion – A Tabletop Learning Lab | April 28, 1:10 PM (Limited capacity—reserve your spot!)

We hope to see you there!

#RSAC2025 #Cybersecurity #AIThreats #Deepfake #CISO #Infosec #RiskManagement

Elm Analytics

📉 There’s no precedent. No script. Just urgent, actionable insight for navigating what’s next.

For more Automotive Supply Chain News on Risk, subscribe (or just read online) our weekly newsletter:

go.elmanalytics.com/426M

#RiskManagement #Newsletter #SupplyChainRisk

Automotive Supply Chain Risk Digest #426

Major automakers face tariffs, layoffs, leadership…

go.elmanalytics.com
Resilience Theatre @38C3

Don't be victim of corporate IT. Make sure your travels include Edgemap pouch which enhances your preparedness and resilience when you need them most. Check out my latest article on this [1].

[1] resilience-theatre.com/wiki/do

#edgemap #riskmanagement #travelsecurity #opsec #preparedness

Todd A. Jacobs | Pragmatic Cybersecurity

@elementary tl;dr I support your objectives, and kudos on the goal, but I think you should monitor this new policy for unexpected negative outcomes. I take about 9k characters to explain why, but I’m not criticizing your intent.

While I am much more pragmatic about my stance on #aicoding this was previously a long-running issue of contention on the #StackExchange network that was never really effectively resolved outside of a few clearly egregious cases.

The triple-net is that when it comes to certain parts of software—think of the SCO copyright trials over header files from a few decades back—in many cases, obvious code will be, well…obvious. That “the simplest thing that could possibly work” was produced by an AI instead of a person is difficult to prove using existing tools, and false accusations of plagiarism have been a huge problem that has caused a number of people real #reputationalharm over the last couple of years.

That said, I don’t disagree with the stance that #vibecoding is not worth the pixels that it takes up on a screen. From a more pragmatic standpoint, though, it may be more useful to address the underlying principle that #plagiarism is unacceptable from a community standards or copyright perspective rather than making it a tool-specific policy issue.

I’m a firm believer that people have the right to run their community projects in whatever way best serves their community members. I’m only pointing out the pragmatic issues of setting forth a policy where the likelihood of false positives is quite high, and the level of pragmatic enforceability may be quite low. That is something that could lead to reputational harm to people and the project, or to community in-fighting down the road, when the real policy you’re promoting (as I understand it) is just a fundamental expectation of “original human contributions” to the project.

Because I work in #riskmanagement and #cybersecurity I see this a lot. This is an issue that comes up more often than you might think. Again, I fully support your objectives, but just wanted to offer an alternative viewpoint that your project might want to revisit down the road if the current policy doesn’t achieve the results that you’re hoping for.

In the meantime, I certainly wish you every possible success! You’re taking a #thoughtleadership stance on an important #AIgovernance policy issue that is important to society and to #FOSS right now. I think that’s terrific!

Brian Greenberg

🔓 Oracle finally admits to a major data breach—after being sued for hiding it.

Just days after being hit with a class-action lawsuit for allegedly covering up a major data breach, Oracle has begun privately notifying some customers of a security incident that compromised login credentials—including data from as recently as 2024.

Key highlights:
🔓 Hacker accessed usernames, passkeys, and encrypted passwords
💰 Extortion attempt reported
⏱️ Lawsuit claims Oracle failed to notify victims within 60 days
⚖️ Plaintiffs demand better security & transparency

Despite Oracle calling it an outdated system, the lawsuit points to risks that are very current. This is a critical moment for cloud providers to re-evaluate incident response protocols.

Full story: csoonline.com/article/3953644/

#CyberSecurity #Oracle #DataBreach #IncidentResponse #RiskManagement #Privacy #Infosec

Oracle quietly admits data breach, days after lawsuit accused it of cover-up

A lawsuit filed Monday accused Oracle of failing to…

CSO Online
LMG Security

Are You Ready for Red Team Penetration Testing?

In our latest blog, penetration testing expert @tompohl shares how to choose the best test for your organization's cybersecurity maturity stage. We'll cover the difference between penetration testing and red team penetration testing, how to determine if your company is ready for a red team assessment, and tips for planning your test that will maximize your ROI!

Read More: lmgsecurity.com/are-you-ready-

#Cybersecurity #RedTeamTesting #PenetrationTesting #CISO #Pentest #DFIR #Infosec #ITsecurity #RiskManagement #Security #IT

Are You Ready for Red Team Penetration Testing? | LMG Security

Read this blog to discover the differences between…

LMG Security
Resilience Theatre @38C3

Don't tell me you have your keys in user space?
#Nitrokey #riskmanagement #redteam #dfir #opsec

Apr 03, 2025, 05:33 · · · 0 · 0
LMG Security

Are Encryption Backdoors Putting Your Organization at Risk?

In this clip, @sherridavidoff and @MDurrin explain why encryption backdoors are a nightmare for organizations, creating security gaps that cybercriminals can exploit.
Watch this full episode of Cyberside Chats to hear Sherri and Matt break down Apple’s battle against the UK’s demands for backdoor access, the worldwide backlash, and what it all means for cybersecurity professionals.

We'll cover:
▪ Why backdoors are a double-edged sword for security
▪ Historical backdoor failures that left organizations exposed
▪ Pro tips to strengthen your security posture against evolving encryption policies

🎥 Watch the full video: youtu.be/5HhNKMIJkCQ
🎧 Listen to the podcast: chatcyberside.com/e/the-encryp

#Cybersecurity #Encryption #Backdoors #AppleVsUK #ITSecurity #CybersideChats #CISO #Riskmanagement #Infosec #cyber #tech #Infosec #Security #CIO

Bob Carver

An old but still true statement for today’s cybersecurity solutions…April Fools!
#cybersecurity #riskmanagement #threatlandscape

Resilience Theatre @38C3

How you implement your 'under four eyes policy' ? Do you really ship your key material without tamper protection ? How about your travels and hotel security ? Signing your releases from disk stored keys? Lot of question where apple believers cannot answer. Stop being stupid.

#opsec #redteam #dfir #riskmanagement #physicalsecurity

[1] youtube.com/watch?v=WOqfqDpDx6o

LMG Security

Learn how to pentest your own network in our new step-by-step guide from Senior Cybersecurity Consultant Bryan Bijonowski Jr. Bryan explains why penetration testing is crucial for identifying weaknesses before attackers do, then guides IT professionals through the process of pentesting their own networks to strengthen their organization's defenses and significantly reduce cybersecurity risks!

Check it out: lmgsecurity.com/how-to-pentest

#Pentest #pentesting #DFIR #Infosec #cybersecurity #security #riskmanagement #ITsecurity #IT #CISO

How to Pentest Your Own Network: A 7-Step Guide For IT Pros | LMG Security

Learn how to pentest your own network and find security…

LMG Security
LMG Security

New Cyberside Chats Episode Alert! This week, @sherridavidoff and @MDurrin dive into scary new examples of AI deepfake scams that cybercriminals are using to look and sound just like trusted brands.

Watch or listen to the full episode to hear a jaw-dropping #Apple help desk deepfake incident, and learn how attackers are using voice clones, #YouTube, and even #Google to trick security teams.

▶️ Watch: ow.ly/3h1650Vmymo
🎙️ Listen: ow.ly/lsYh50Vmymq

#Deepfakes #Vishing #Cybersecurity #AIThreats #GenAI #CISO #AI #CyberAware #CEO #RiskManagement #VoicePhishing #Infosec #CybersideChats