Happy Women’s History Month! Consortium Networks is proud of its Story Behind the Story: Women in Cybersecurity interview series and is thrilled to feature an interview with Theresa Payton, the first fema...
As things stand now, when a company falls victim to a cyberattack, it is held liable for that incident. Vendors and manufacturers are able to push out products riddled with vulnerabilities without fear of signi...
This month, Twitter announced that as of March 20, text-based two-factor authentication will only be available for Twitter Blue subscribers. Twitter noted that SMS 2FA is very popular, but is the most likely to...
Though the majority of us lament it, we all see that K-12 schools are chronically underfunded. Cleveland School District in the Mississippi Delta kicked off the new school year in August without air conditionin...
The new year is already off to a busy and interesting start in the world of cybersecurity. In addition to an interview with Google’s Sandra Joyce, this newsletter covers the Hive ransomware group take-dow...
Though OpenAI released ChatGPT in November of last year, it has taken the public conversation by storm in the last month. In its own words, ChatGPT is “a state-of-the-art language generation model developed by ...
Early this month, one of the largest wireless network operators in the United States, T-Mobile, filed a disclosure notice to the SEC that a breach was discovered in its networks. This breach, which impacted ove...
The big news in ransomware this month was the FBI’s takedown of the Russia-based Hive Ransomware-as-a-Service (RaaS) group. This group, which was known for its particular tendency for attacking hospitals and sc...
Introduction Washington Watch is an amalgamation of executive, congressional, and judicial action on various topics within cybersecurity designed to inform on the trends and conversations happening in Washin...
Most people agree that keeping the private information of their customers, users, and clients private is a high priority. Data breaches and leaks degrade trust, hurt reputations, and can result in legal proceed...