This category can only be viewed by members. To view this category, sign up by purchasing Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Digital Monthly, Corporate Membership or Basic Free.
World Password Day was May 2, but it’s not too late to avert disaster by ditching “123456,” “qwerty123” or — yes — “password” as your password. If you’re leaning on “sunshine,” that’s also in 2018’s Top 10 Worst Passwords, and hackers probably have your number. (Coloradans: Hackers also know “gobroncos” is a favorite in the […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
Rapid-fire cyber attacks and a shifting regulatory landscape are the “new normal” — and a traditional tech-focused cybersecurity stance isn’t enough anymore. Experts say prioritizing risk management and a law-led approach to cybersecurity could be the difference between an inconvenience and a catastrophic breach. For any business, it could also be the difference between post-breach […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
Breaking into your own house is unnerving. Why wasn’t that window locked? Why didn’t the alarm trip? Why didn’t the neighbors blink? It’s too easy. For the same reasons, cybersecurity experts say, breaking into your own place is important in the cyber world. And that’s what white hat hackers are for. White hat hacking (or […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
We don’t fall for spear phishing because we’re idiots — it’s because we relax behind our email, and because we’re decent people. But, experts say, to stop clicking our way into hackers’ traps we’ll have to start thinking more like criminals. The Solarwinds Cyberthreat Guide, released last week, identified phishing and spear phishing among the […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
Fifteen startups are gearing up for launch camp with nonprofit tech accelerator Exponential Impact — more than double the number that participated in 2018. It’s just one of many changes underway at XI, which this year is adding staff and apprentices, introducing two new programs to serve later-stage entrepreneurs, and expanding its physical footprint. Work […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
People are very, very worried about protecting their data — but not worried enough to work through the nuts and bolts of protecting it. That’s the central finding of Malwarebytes Labs’ latest report, “The Blinding Effect of Security Hubris on Data Privacy,” which surveyed almost 4,000 people to measure their confidence in their own privacy […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
A chance phone call saved a midmarket Front Range firm from sending about $100,000 to hackers posing as its own chief financial officer. The hackers had breached the CFO’s Office 360 account via malware, and lurked there for more than a month, gathering intelligence and sending emails. The money had already been sent when the […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
The K-12 Cyber Incident Map is peppered with markers showing school cybersecurity breaches — and its author says that’s just the tip of the iceberg. “The numbers I have are an under-count,” said Doug Levin, president of EdTech Strategies LLC. Feedback from school district IT leaders and cybersecurity vendors, he said, “is that ‘This is […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
Bitcoin survived a savage 2018, losing about three-quarters of its value between Jan. 1 and Dec. 31. Ether and Ripple fared worse, and the year’s end brought a slew of headlines asking, “Is Bitcoin Dead?” and “Is Cryptocurrency Dead for Good?” It’s complicated, but the short answer is no. Undoubtedly, the crypto industry had a […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
The cyber landscape shifted again in 2018. Colorado Senate Bill 18-086 injected much-needed public funding for cybersecurity, the National Cybersecurity Center launched an array of training programs and research initiatives, and c-Watch kicked off its first official cohort. Blockchain bill When Gov. John Hickenlooper signed Senate Bill 086 into law at the end of May, […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
For malware, the future is fileless. Malwarebytes Labs released their 2019 security predictions Nov. 27, and followed up with another report, ‘Under the Radar — The future of undetected malware,’ on Wednesday. That report delves into the rapid rise of fileless malware and the difficulties of stopping it. Staring down 2019’s most alarming cybersecurity threats […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.
Editor’s note: This is the second in a two-part series about the impacts of the collection, distribution and commercial use of consumer data. Part I was published in the Nov. 16 edition of the Business Journal. All day, every day, companies are sucking up vast amounts of your personal information, manipulating it, packaging it and […]
This content is only available to members of the CSBJ. To gain access, you'll need to sign in or purchase Digital, Silver Membership, Print & Digital, Print, Digital and The Transcript, Corporate Membership or Digital Monthly If you're already a member, sign in here.