Home
About
Contact Us…
Twitter
Tech Security Bytes
Search
Security
July 11, 2024
The Supreme Court Takes Aim at Chevron: Implications for Cybersecurity Regulations (and why you shouldn’t panic)
Sean Reilly
Federal Government
,
Regulations
,
Supreme Court
June 3, 2024
Sifting through the blizzard: What’s really going on with Snowflake and recent MASSIVE breaches (Santander, TicketMaster, etc..)?
Sean Reilly
Breach
,
Corporate
,
SaaS
May 24, 2024
Uncle Sam “Rescues” Healthcare: US Government to spend $50mm building security capabilities that already exist for customers who won’t (or can’t) use them
Sean Reilly
Corporate
,
Government
,
Healthcare
,
USA
March 20, 2024
NIST CSF 2.0: Much ado about something
Sean Reilly
cybersecurity
,
framework
,
NIST
,
Security
,
Technology
February 6, 2024
Microsoft, MoveIt, Now Cloudflare: Why Legacy Assets and Mismanaged Credentials Keep Haunting Tech Giants
Sean Reilly
Asset Management
,
Breach
,
Cloudflare
,
Corporate
,
Incident Response
,
Legacy
,
Supply-Chain
,
Third Party
January 22, 2024
From Blue Screens to Red Alerts: Midnight Blizzard Hits Microsoft
Sean Reilly
APT
,
Corporate
,
Espionage
,
Legacy
,
MFA
,
Microsoft
,
Russia
January 12, 2024
Don’t Just Read, Hack the Headlines: Extracting Actionable Insights from Cybersecurity News
Sean Reilly
Breach
,
Intelligence
,
News
November 16, 2023
Amazon’s Astro Bot for Business Security – A Solution Searching for a Problem?
Sean Reilly
Corporate
,
PhysicalSecurity
November 9, 2023
The Okta Oversight: A Case Study in Cybersecurity Complacency
Sean Reilly
ClientBreach
,
Corporate
,
EndPointSecurity
,
WebAppControls
November 6, 2023
Robbed without a mask or a gun: A firsthand account of identity theft: Part 2
Sean Reilly
IdentityTheft
,
Personal
Next Page
→
Subscribe
Subscribed
Tech Security Bytes
Sign me up
Already have a WordPress.com account?
Log in now.
Tech Security Bytes
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar