Three-dimensional lock icon isolated on abstract blue

Can “They” Protect Your Privacy?

When it comes to the data we provide companies, we often believe “they” are going to safeguard our information the same way we would—but this could not be further from the truth. With that said, these organizations have continued to suffer data breaches and other cybersecurity failings. So why do…

Continue Reading
Phishing Cyber Security Fingerprint Ransomware Email Encrypted Technology, Digital Information Protected Secured

Phishing Campaigns Level Up

A new type of phishing scheme has gained popularity among black hat actors for its high success rate: precision-validating phishing. Instead of sending out phishing emails in bulk, this new tactic solely engages with email addresses actors have been able to verify as legitimate and high-value targets. Often, this means…

Continue Reading
High school students e-learning over computers in the classroom.

Further Effects of the Cybersecurity Information Sharing Act

As we have discussed in a previous issue, the Cybersecurity Information Sharing Act of 2015 is set to expire at the end of September—and there is potential cybersecurity fallout with K-12 schools. Averaging five cybersecurity incidents per week, school districts across the nation have become a prime target for cybersecurity…

Continue Reading
Documents law regulation and compliance rules.Document of Standards, Regulations,Requirements and Compliance concept

CISA Security Guide

In what can be expected to serve as a landmark collaboration, nine leading cybersecurity and infrastructure agencies (across five countries) have contributed to a comprehensive guide to assist operational technology owners and operators in critical infrastructure sectors. This guidance helps operators to manage any device that is connected to their…

Continue Reading
Eye Digital Data - AI Artificial Intelligence and program code

The Cybersecurity Risks of Using AI Tools

With the proliferation of artificial intelligence tools and chatbots, a prevalent question has emerged in terms of how to protect against the cybersecurity vulnerabilities to users are exposed. One example arises when users share sensitive information with models because these tools are not properly protected against attacks—accordingly, the information that…

Continue Reading
Government officials talk over technical paperwork

The National Cybersecurity Review

In recent years, states and local communities have experienced a rise in cybersecurity threats aimed at critical infrastructure and other key targets. But this rise in attacks has not led to an increased ability for states to handle cybersecurity protections on their own. In fact, last year’s Nationwide Cybersecurity Review…

Continue Reading
Portrait of Black young man wearing glasses as IT

Should We Rethink Data Sharing?

Here is a remarkable statistic: last year, more than 5.5 billion users had one of their personal accounts compromised as the result of a data breach. We tend to think of data breaches as the result of organizational negligence, but outside forces have a larger impact than one might think.…

Continue Reading

Social Media Overexposure

As AI continues to dominate the broader internet landscape, users have begun asking questions about the legitimacy of their interactions online. In this episode, our expert talks to us about what it was like to build social media bots that, on the one hand, helped his clients gain millions of…

Continue Reading

The Top Target for Crimeware? Manufacturing

More than any other industry, manufacturing takes the brunt of ransomware attacks—and these hacks do not appear to be slowing down. In combination with the other most-hit industries (e.g., professional, scientific and technical services), ransomware attacks against these sectors accounted for more than 40% of all 2024 incidents. For those…

Continue Reading

Where Are the Most Data Leaks?

In previous issues of MyIDMatters, we have discussed the vast differences between the data protection policies of each of the 50 states (assuming such policies even exist!). We have noted that, despite the success of larger frameworks like the European Union’s cyber policy, there are no comprehensive federal laws in…

Continue Reading

Enter the Dragon (Raas)

Those of us who have seen the Godfather are familiar with the concept of the “Five Families of Crime.” However, very few of us know that there is a “Five Families of Crimeware.” One of these organizations has been linked to a string of recent cybersecurity attacks leading to millions…

Continue Reading

Liabilities vs. Vulnerabilities

How well-positioned are corporations to protect consumer data? This question is on the minds of many analysts as cyberattacks become increasingly prevalent with the aid of artificial intelligence. These attempted breaches are stress-testing organizations who are tasked with safeguarding personal data, and they are also putting CISOs in uncomfortable positions.…

Continue Reading

The Cybersecurity Information Sharing Act’s Renewal

With the expiration of the Cybersecurity Information Sharing Act (CISA) of 2015 on the horizon, House intelligence committees have recently received briefings on the efficacy of the law, detailing to what extent private businesses have been willing to share cyber threat data with the government. However, new developments have placed…

Continue Reading

Postal Codes and Cybersecurity

These days, innocuous bits of personal information can be used to protect—or compromise—your cybersecurity. What may astonish readers to learn is that your postal code information is currently being used to strengthen fraud protection against cyberattacks. Having been embedded in e-commerce systems, identity verification checks and logistics operations, postal codes…

Continue Reading