Krebs on Security has posted a new item.
When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it a fundamentally unfixable problem. But don’t tell that to Matt Donahue, a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests — in part by assigning trustworthiness or “credit ratings” to law enforcement authorities worldwide.
krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/
Please use the link above to continue reading this posting. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
To protect against imminent cyber threats, organizations need to secure their most valuable assets and the access points that lead to them. Critical access management empowers organizations to mitigate cyber threats, be proactive in cybersecurity efforts, recognize vulnerabilities and weaknesses in access security, and maintain compliance.
Download SecureLink’s eBook to learn more about:
– Past breaches that make critical access management a necessity – The definition of critical access and the three pillars of critical access management – How to identify the high-risk, critical access points and assets in your organization – Technology and tools to help you implement critical access management
Download now: www.krebsonsecurity.com/securelink/ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You received this e-mail because you asked to be notified when new updates are posted.
Best regards,
BrianKrebs krebsonsecurity.com
P.S. You may manage your subscription here: krebsonsecurity.com/subscribe/
When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it a fundamentally unfixable problem. But don’t tell that to Matt Donahue, a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests — in part by assigning trustworthiness or “credit ratings” to law enforcement authorities worldwide.
krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/
Please use the link above to continue reading this posting. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
To protect against imminent cyber threats, organizations need to secure their most valuable assets and the access points that lead to them. Critical access management empowers organizations to mitigate cyber threats, be proactive in cybersecurity efforts, recognize vulnerabilities and weaknesses in access security, and maintain compliance.
Download SecureLink’s eBook to learn more about:
– Past breaches that make critical access management a necessity – The definition of critical access and the three pillars of critical access management – How to identify the high-risk, critical access points and assets in your organization – Technology and tools to help you implement critical access management
Download now: www.krebsonsecurity.com/securelink/ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You received this e-mail because you asked to be notified when new updates are posted.
Best regards,
BrianKrebs krebsonsecurity.com
P.S. You may manage your subscription here: krebsonsecurity.com/subscribe/