Cyber Insurance & Vague Exclusion Carve Outs

December 2, 2021

Recently Lloyd's the insurer adjusted their policies to exclude actions that could be considered cyber warfare, or associated with a sovereign..

Happy Thanksgiving 2021!

November 25, 2021

As another year nears a close, London Security wants to wish everyone in the US a great Thanksgiving!We have a lot of things to be grateful for..

Demonstrating Cybersecurity's Importance

November 18, 2021

Day after day we are seeing new threats revealed, and those professionals in the Cybersecurity space are getting a little bit jaded.  We know how..

A failure to plan, is a plan for failure

November 11, 2021

As we near the end of the year, it comes time to talk about why planning out Security is important.  So we will use some terms to explain the..

CISA Binding Operational Directive 22-01 - What is it?

November 4, 2021

On November 3rd, the Department of Homeland Security issued BOD 22-01 to all Federal agencies.  This is a mandate to resolve many of the Critical..

Hive Attacks & Healthcare Ransomware

October 28, 2021

Anyone remember the Ransomware attack in Ohio earlier this year?  The hacker group Hive was responsible, and one of their key differentiators was..

Breaches, Hacks, and Data Theft! Oh My!

October 21, 2021

The past several years have seen an incredible increase in the security threats targeting businesses, and the results haven't been pretty.  The..

October is Cybersecurity Awareness Month

October 14, 2021

Perhaps you already knew this, perhaps you didn't.  Either way, the purpose is to bring attention to a topic that should always be "top of mind".

Diversify Security - Learn from Facebook's Outage

October 7, 2021

As many people know, this week Facebook had a massive outage that affected all of their services.  The cause of this is straightforward, simple,..

Understanding the SMS Subscription Malware - Grifthorse

September 30, 2021

PCMag recent reported a new type of SMS Subscription Malware called Grifthorse which is an interesting model of malware that researches discovered..

Subscribe to our blog