We have discussed in previous issues how artificial intelligence is being deployed at a large scale by both bad actors and white hats, effectively resulting in a cybersecurity stalemate. However, an interesting development regarding AI cybersecurity has arisen with a recent announcement from OpenAI: according to the company, they have…
MyIDMatters has been tracking the development of new privacy laws across the country, and we are excited to announce that California has become the latest state to enact laws aimed at protecting user information. These laws are geared toward offering consumers increased opt-out preferences, accessible social media account delete buttons,…
Once again, it appears as though the Cybersecurity Information Sharing Act of 2015 (CISA) will survive until January—just in the nick of time. After briefly lapsing on January first, the continuing resolution passed in the wake of the government shutdown extended the CISA until January 30th. This short window means…
For nearly 50 years, automobiles have utilized embedded software to optimize their efficiency. In 1977, when this technology was first introduced, computer hacking was not a concern for manufacturers or drivers; however, as vehicles become increasingly more connected, they are open to software vulnerabilities that black hat actors can manipulate.…
In many past articles and podcasts, we have discussed the importance of virtual private networks (VPNs) as critical tools for individual cybersecurity. When utilizing a VPN, users encrypt their web traffic and queries, which secures their data from man-in-the-middle attacks as well as being read by internet service providers. However,…
A Day in the Life of a Cybersecurity Expert When we think about cybersecurity, we often think about the steps and actions we take to keep our data safe. But what about the individuals working to provide us with the tools and monitoring to take our defenses to the next…
When it comes to the data we provide companies, we often believe “they” are going to safeguard our information the same way we would—but this could not be further from the truth. With that said, these organizations have continued to suffer data breaches and other cybersecurity failings. So why do…
A new type of phishing scheme has gained popularity among black hat actors for its high success rate: precision-validating phishing. Instead of sending out phishing emails in bulk, this new tactic solely engages with email addresses actors have been able to verify as legitimate and high-value targets. Often, this means…
As we have discussed in a previous issue, the Cybersecurity Information Sharing Act of 2015 is set to expire at the end of September—and there is potential cybersecurity fallout with K-12 schools. Averaging five cybersecurity incidents per week, school districts across the nation have become a prime target for cybersecurity…
In what can be expected to serve as a landmark collaboration, nine leading cybersecurity and infrastructure agencies (across five countries) have contributed to a comprehensive guide to assist operational technology owners and operators in critical infrastructure sectors. This guidance helps operators to manage any device that is connected to their…
With the proliferation of artificial intelligence tools and chatbots, a prevalent question has emerged in terms of how to protect against the cybersecurity vulnerabilities to users are exposed. One example arises when users share sensitive information with models because these tools are not properly protected against attacks—accordingly, the information that…
In recent years, states and local communities have experienced a rise in cybersecurity threats aimed at critical infrastructure and other key targets. But this rise in attacks has not led to an increased ability for states to handle cybersecurity protections on their own. In fact, last year’s Nationwide Cybersecurity Review…
Here is a remarkable statistic: last year, more than 5.5 billion users had one of their personal accounts compromised as the result of a data breach. We tend to think of data breaches as the result of organizational negligence, but outside forces have a larger impact than one might think.…
As AI continues to dominate the broader internet landscape, users have begun asking questions about the legitimacy of their interactions online. In this episode, our expert talks to us about what it was like to build social media bots that, on the one hand, helped his clients gain millions of…

