Category Archives: cloud security

Supply Chain Risk

Industry Giants Impacted By Supply Chain Attack It was recently announced that a well known supply chain for heavy hitters in the automotive and aerospace industry had been undermined. Visser Precision, a custom parts maker for major companies such as Tesla, SpaceX, and Boeing, revealed that it had been a victim of a cybersecurity attack…

Ransomware Legislation

The Surprising Truth About Ransomware Laws Imagine there is a person right now with possession of a ransomware malware that is targeting you and your business. Before they get a chance to use it, you discover their scheme and call the authorities. You would think for certain that they would be penalized by the law….

Tiro Security 2019: Year in Review

2019 has come to an end and we are now about a week into a new year and new decade. Since all the festivities have finished and most of our clients are back at work focused on 2020, I wanted to take some time to look back at the past year to reflect on the…

Diversity and Inclusion in Cybersecurity

This past week, our amazing Senior Recruitment Consultant, Chrissy was fortunate enough to attend the Wonder Women Tech National Conference in Long Beach on behalf of Tiro Security. Wonder Women Tech is a non-profit organization that seeks to highlight, educate, and celebrate women and the underrepresented in STEAM industries (Science, Technology, Engineering, Arts, Math.) This…

Ransomware and Its Victims

Ransomware in the News Just this week, there has been a report of a ransomware attack that has plagued our local San Bernardino City Unified School District. This attack directly targeted the school district’s computer network which in turn has blocked all entry to numerous vital district files. While District Safety Manager Eric Vetere maintains…

SXSW 2018 – Speaking on IoT Security

Tiro Security Co-Founder and Head of Penetration Testing, Rob Pope will be speaking at the world renowned SXSW Conference in Austin, TX on the 14th March 2018. Rob will be infusing some of his British humor into the talk entitled Internet of Scary Things: Botnet in a Box.  For more information please click here. We have posted these before but here…

Zero-Day alert: Spectre and Meltdown Widespread Hardware Vulnerability

Your computer, your phone, your tablet, your TV server: if it has a computer chip and can be accessed, it is vulnerable to Spectre and Meltdown. These are the names of data security vulnerabilities found in the physical hardware that is used in nearly all computers and handheld devices dating back over 20 years. Companies…

Speaking today on IoT Security

With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic.  Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen.  These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down…

EU – US Privacy Shield – Safe Harbor with a bite?

What is Safe Harbor / EU Privacy Shield? Since the Edward Snowden leaks, the fear of EU citizens data being spied on by the US authorities led to the old rules (Safe Harbor) being kicked out by the European court of justice. Rather, the EU privacy shield was introduced as a replacement. It is basically…