The earliest days of cyber breach insurance covering unauthorized network access, data loss, and malware-related claims began in earnest in the early 2000s – especially following the 2003 California Security Breach and Information Act, which mandated notification to any resident whose unencrypted personal information had been accessed or acquired by an unauthorized person.
The US Cybersecurity and Infrastructure Security Agency (CISA) has named April as the National Supply Chain Integrity Month. The intent is to bring awareness to supply chain security issues and call on all US governmental and commercial organizations to do their part to “Fortify the Chain.”
On February 23, we learned that Russia had invaded Ukraine after months of threats & demands. Could U.S. critical Infrastructure be affected?
Issue Background Java is a software platform and programming language used in many of the 1 billion Webservers on the Internet. It’s also found in smartphones, vehicles, IoT devices,...
The U.S. multifamily property management industry encompasses 40 million multifamily units valued at $3 trillion. More than 800,000 people work as employees of the management industry, while tech and service vendor companies employ hundreds of thousands more. And the industry is growing, requiring 4 million more units by 2030 just to keep up with demand. (Source: https://www.forbes.com).
Just before the Fourth of July weekend, we saw an advisory from Kaseya Corp., the Miami-based maker of remote access software, that its Virtual System/Server Administrator (VSA) software had been compromised.
Contain Your Enthusiasm! How Abacode Can Continuously Monitor Your Docker and Kubernetes Environments.
The modern method for delivering software applications to users is containers.
The increasing complexity of application deployments is what gave rise to containers a few years back.
Here are some thoughts on the landmark June 3 Supreme Court ruling which found, in a 6-3 vote, that the Computer Fraud and Abuse Act of 1986 (CFAA) does not cover situations in which people who are authorized to access a computer system do so for improper reasons.
The recent Colonial Pipeline ransomware attack appears to have been fairly run-of-the-mill and not much different from other attacks we’ve seen – other than the fact that it shut down critical infrastructure, spiked gas prices, and created FUD in the United States populace.
I have been working in cybersecurity for 25+ years and for the past five years in multifamily IT environments. I have learned about the typical scenarios in multifamily property management:
(1) numerous remote users (even before COVID!),
(2) heavy reliance on cloud and Software-as-a-Service (SaaS) – from providers such as Yardi, RealPage, Entrata, and ResMan, and
(3) often a sense that those SaaS providers are “taking care of security for me.”