Remove 2022 Remove Risk Remove Technology
article thumbnail

SecureMySocial Issued 5th US Patent For Social Media Security Technology

Joseph Steinberg

The patent was issued by the United States Patent Office on September 6th, 2022, with a priority date going back over a decade, to June of 2012. US 11,438,334 – Granted in September of 2022. US 10,771,464 – Granted in September 2020. All of the patents can be read by visiting my Google Scholar page.

Media 269
article thumbnail

Best Practices for Hospitals To Manage Risks To CyberSecurity Created By Medical Technology And Information Systems: A Webinar With The CIA’s Former CyberSecurity Director And The Top CyberSecurity Columnist

Joseph Steinberg

Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals. The discussion will cover: * How IT asset risks have evolved.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Patch Tuesday, March 2022 Edition

Krebs on Security

Those include remote code execution bugs CVE-2022-24512 , affecting.NET and Visual Studio , and CVE-2022-21990 , affecting Remote Desktop Client. CVE-2022-24459 is a vulnerability in the Windows Fax and Scan service. All three publicly disclosed vulnerabilities are rated “ Important ” by Microsoft.

article thumbnail

GUEST ESSAY: Why the arrests of cyber criminals in 2021 will incentize attackers in 2022

The Last Watchdog

In 2022 we expect to see more aggressive and complex ransomware efforts. If 2021 was the year that Zero Trust security reached mainstream IT — and it was — then 2022 will become the realization that it cannot be done without identity first. Central importance of identity. The ascendency of CISOs.

CISO 262
article thumbnail

Why Businesses Must Address Risks of Quantum Computing NOW Rather Than Wait Until Problems Arrive

Joseph Steinberg

And, while today’s commercially-created quantum machines are nowhere near powerful enough to approach quantum supremacy, absolutely nobody knows the true extent of the quantum capabilities of all of the technologically-advanced governments around the world. Clearly, there is a need to act in advance – and acting takes time.

Risk 338
article thumbnail

The Biggest Cybersecurity Risk We're Ignoring—And No, It's Not AI

SecureWorld News

But amidst all these flashy, futuristic threats, the biggest cybersecurity risk remains the same as it's always beenhumans. Especially upon the emergence of exponential technologies of the Metaverse and Neuro-technologies (like Neuralink) that is transcending the very nature of cyber and cognitive attacks.

article thumbnail

How Cryptocurrency Turns to Cash in Russian Banks

Krebs on Security

An analysis of their technology infrastructure shows that all of these exchanges use Russian email providers, and most are directly hosted in Russia or by Russia-backed ISPs with infrastructure in Europe (e.g. A machine-translated version of Flymoney, one of dozens of cryptocurrency exchanges apparently nested at Cryptomus.