top of page
Scott Anderson
Admin
More actions
Profile
Join date: Mar 10, 2025
Posts (15)
Feb 12, 2026 ∙ 3 min
Establishing a Culture of Cybersecurity in Your Organization
“As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” — Britney Hommertzheim, Business Information Security Officer (BISO) for Cardinal Health \ What is the leading cause of data breaches for small businesses? If you guessed inadequate firewalls, bad configuration management, or poor systems administration, you’d be incorrect. According to the Data Breach Investigations...
4
0
Nov 3, 2025 ∙ 2 min
Advanced Persistent Threat (APT) Attack targeting the Biomanufacturing industry - Overview and Proposed Response Actions for DIB organizations
Since January 2020, a proliferation of malware and variants has been targeting the bioeconomy. The malware is delivered by a popular ‘loader’ application called SmokeLoader, which is designed to affect both Windows machines and servers. Tardigrade is a variant of the SmokeLoader malware loader family and targets Windows platforms. It is a mechanism used to download other viruses onto infected machines, but it also has ‘virus-like’ properties that can be very damaging to an information...
10
0
Nov 3, 2025 ∙ 3 min
North Korea's Remote Worker Scam
Since the notion of artificial intelligence (AI) emerged in the 1950s, it has been a staple of pop culture. While there are countless good news scenarios of AI's potential positive impact on our world, many rational people saw it as a Pandora's Box. The sci-fi world is replete with stories of AI underpinned masses running amok and eviscerating humankind. Be it a formidable army of cyborg warriors that overwhelms us or an innocuous, uncountable cluster of smart bots that eventually outwits us,...
4
0
bottom of page