We are following the news of recently published vulnerabilities to Intel CPU architectures. These vulnerabilities are known as microarchitecture data sampling (MDS) flaws, with implementations variously called Zombieload, RIDL, and Fallout. These vulnerabilities are related to previously published Spectre and Meltdown flaws.Continue reading Microarchitecture Data Sampling (MDS) – Zombieload
Is Your Email Secure?
Email is ubiquitous with business operations and we’ve established routines and habits for it’s use. But, is the way we use it really trustworthy? How do I know the email you send me is really from you? Regular emails can be spoofed at will, with the ‘from’ address changed to any that might be suitable to fool me.
Continue reading Email Digital Signatures – Do you know who it’s from?
At Assured Bridge, we’ve created services that help businesses meet their security and compliance requirements as described by NIST SP 800-171 and DFARS Clause 7012. It’s important to note that I say “help” here; not all security controls and processes needed can be purchased. Part of the compliance effort involves changes to how your company operates.
Continue reading Compliance is a Shared Responsibility