Paul Wartenberg

June 5, 2019

Keep Your Business Data Compliant

Data security is a very serious and very personal concern for your business and for your customers. DarkHound SecOps is confident and committed to its security […]
May 21, 2019
Trump

You Opened Up a Malicious File, Now What?

Weaponized documents are so effective at compromising organizations that attackers of all skill levels use them, from state-sponsored hackers to criminal skids, suggests Lisa O’Reilly from […]
May 9, 2019

CCH Cloud-Based Tax Division of Wolters Kluwer Hit With Malware

Worried about your tax return? You might have good reason for concern. As many are now aware, CCH, the cloud-based tax division of the global information […]
April 11, 2019
Disaster Recovery Checklist

The Ultimate Disaster Recovery Checklist

STAY ONE STEP AHEAD OF POTENTIAL DISASTERS Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential […]
April 5, 2019
Compromise

POS Compromise Leaves 2 Million Exposed

Over 2.15 million customer credit cards were sold online from Buca di Beppo, Earl of Sandwich, Planet Hollywood, Tequila Taqueria, Chicken Guy!, and Mixology. The 10-month […]
March 8, 2019

IOT: Internet of Things

Welcome to DarkHound SecOps. This is our new series “Coffee With a Hacker.” Episode 1, IOT: Internet of Things In this series we will explore the […]
February 28, 2019
Bad Guy

The Cost of Being a Bad Guy Just Went Down

Get your sinister laugh ready…for only $34 a month, you too can be a bad guy. According to the new cyber report from Deloitte, the entry […]
February 22, 2019
Phishing Attacks

Phishing Attacks Take A New and Scary Approach

Let’s be honest…managing all your online passwords is a big headache. I write about this stuff and yet I still struggle to use best practices in […]
February 14, 2019
Cyber Litigation

Is Your Business Ready for Cyber Litigation?

When household brands suffer data breaches, you’re on notice that your business could be the next potential target for cybercriminals. This has the potential to impact […]