[Krebs on Security] Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Krebs on Security has posted a new item.
On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.
krebsonsecurity.com/2022/03/fake-emergency-search-warrants-draw-scrutiny-from-capitol-hill/
Please use the link above to continue reading this posting. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
The first step in securing an organization’s critical access points is implementing access governance. Access governance consists of the systems and processes put in place to ensure access policy is followed as closely as possible.
Download the access governance checklist to learn:
– How to implement clear and defined access policies – How to align policies with least privileged access – Best practices to enforce access governance
Download the checklist now: www.krebsonsecurity.com/securelink/ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You received this e-mail because you asked to be notified when new updates are posted.
Best regards,
BrianKrebs krebsonsecurity.com
P.S. You may manage your subscription here: krebsonsecurity.com/subscribe/

Leave a comment

Your email address will not be published. Required fields are marked *