Zscaler warns that ransomware attacks on oil and gas surge 935%, as critical sectors targeted New data from Zscaler shows that manufacturing, technology, and healthcare remain the most frequently targeted sectors, representing high-stakes environments that are ripe for extortion and leverage, where disruption can yield maximum leverage for attackers. {Read full article here} TSA Issues Warning for […]
Author Archive: Jim Kimmons
Breaking News and Related Posts 7-25-2025
Courts aren’t ready for AI-generated evidence Photos, videos and audio — once courtroom gold — are becoming less reliable as deepfakes spread, digital forensics experts warn. Why it matters: Courts can’t keep up, and there aren’t enough forensic analysts to verify AI-faked evidence. The big picture: AI-generated evidence can take many forms. Consider the following hypotheticals: {Read […]
Breaking News and Related Articles 7-18-225
Small Army Of Cybersecurity Warriors Trains To Digitally Defend Energy Industry As Wyoming aspires to be an energy powerhouse, a new generation of cybersecurity defenders is training in Wyoming and at the Idaho National Lab. As AI booms, so does the need to protect that critical infrastructure from digital threats. {Read full article here} TSA […]
Breaking News and Related Articles 7-10-2025
Cybersecurity:Implementation of the 2015 Information Sharing Act Malicious cyberattacks on the federal government and the nation’s critical infrastructures, such as electricity and healthcare, are growing in number, impact, and sophistication and have led to significant disruptions. {Read full article here.} Has your personal information been exposed in a data breach? Here’s what to do Data breaches […]
Breaking News and Related Articles
Texas creating task forces to target Permian Basin oil field thefts ODESSA — At least three times a week, Darin Mitchell gets the call. Oil drums have been stolen. Copper wires were yanked. Other field equipment at an oil and gas facility was pilfered. The Winkler County Sheriff dispatches his officers to investigate, but they […]
Breaking News and Related Posts 6-13-2025
Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13964 and Executive Order 14114” […]
Breaking News & Related Articles 5-30-2025
Cybersecurity Report Details Growing Corporate Risks Supply chain vulnerabilities, aging infrastructure, cybersecurity patches and incident response gaps need help, TXOne Networks says. {Read full article here} New Research Reveals Multiple Attack Surfaces in WeChat & Other Instant Messaging Apps Instant messaging (IM) applications like WhatsApp, Telegram, WeChat, and QQ have become the “digital arteries” of […]
Breaking News & Related Articles 5-9-2025
Just 5% of Enterprises Have Deployed Quantum-Safe Encryption The vast majority of businesses in the US, UK and Australia have not yet deployed post-quantum cryptography (PQC), despite a majority believing that quantum computing will break current encryption within five years, according to DigiCert. The TLS/SSL certificate authority (CA) polled around 1000 senior and C-level cybersecurity […]
Breaking News & Related Articles 5-2-2025
Dualroots AI-Powered Safety Platform Enhances Oil & Gas Operations Dualroots, a renowned IT solutions provider with a strong presence in the Middle East and Africa, has launched the SMART Safety Surveillance & Security (S4) platform, a groundbreaking digital transformation tool for the oil and gas sector. This AI-powered IoT platform is designed to enhance workforce […]
Breaking News & Related Articles 4-25-2025
Internal Investigations and Crisis Management When issues arise internally, in-house counsel must respond swiftly and effectively. This session will outline strategies for managing investigations and crises, covering: When and how to conduct an internal investigation Preserving privilege and handling whistleblower complaints Responding to government inquiries and subpoenas Crisis communications and reputational risk considerations When internal […]