493 Followers
297 Following
1.5K Posts
#Cybersecurity gadabout and current trophy husband; fan of #jazz, #writing #coffee, #guitars, #cocktails, #enterprisesecurityarchitecture and #whiskey. Obvs, RT ≠ endorsements. www.edwincovert.com
Websitehttps://www.edwincovert.com
LinkedInhttps://www.linkedin.com/in/ecovert/
Twitterhttps://twitter.com/ebcovert3
LocationLos Angeles, USA
Major US Telecom Backbone Firm Hacked by Nation-State Actors
UN agreement on cybercrime criticized over risks to cybersecurity researchers

The convention, up for ratification beginning this weekend, aims to improve response to cybercrime, but opponents say its vague language could impair cyber defense.

CSO Online
Ransomware recovery perils: 40% of paying victims still lose their data

Paying the ransom is no guarantee of a smooth or even successful recovery of data. But that isn’t even the only issue security leaders will face under fire. Preparation is key.

CSO Online

All. Of. This! Security is a function of the business to manage risk > CISOs must prove the business value of cyber — the right metrics can help

https://www.csoonline.com/article/4083604/why-cybersecurity-leaders-find-important-to-prove-the-business-value-of-cyber.html

CISOs must prove the business value of cyber — the right metrics can help

CISOs still struggle to prove the value of their security programs using metrics that their business leaders so desperately seek.

CSO Online

In this article, note this key phrase "a BCP isn’t proven until it’s tested." Ross Young recently made a similar comment in a post and it was spot on. If you are not regular (more than annually people!) testing your BCP, you don't actually have one IMO.

https://www.securitymagazine.com/articles/101929-the-bcp-proving-ground-a-blueprint-for-a-successful-test

The BCP Proving Ground: A Blueprint for a Successful Test

<p>Test the BCP to ensure the process is organized, insightful and strengthens crisis response capabilities.</p>

Security Magazine
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

The malicious app required to make a “Pixnapping” attack work requires no permissions.

WIRED
"At least two hacking groups are using public blockchains to conceal and control malware in ways that make their operations nearly impossible to dismantle" > https://www.bankinfosecurity.com/hackers-use-blockchain-to-hide-malware-in-plain-sight-a-29741
I, for one, welcome our future robot overlords > https://www.cio.com/article/4072396
Coming AI regulations have IT leaders worried about hefty compliance fines

More than 70% of IT leaders say regulatory compliance is a top concern while deploying generative AI — and the spate of AI regulations have only just begun.

CIO

I'm sorry but the #fcc is making a mistake here. Weakening these requirements will make the country less safe

https://www.cybersecuritydive.com/news/fcc-cybersecurity-telecommunications-carriers-brendan-carr-eliminate-rules/804259/

FCC will vote to scrap telecom cybersecurity requirements

The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

Cybersecurity Dive
"On October 15, 2025, the UK Information Commissioner’s Office (“ICO”) announced a £14 million fine against Capita for failing to ensure the security of personal data relating to a significant personal data breach. The fine was split between Capita plc (£8 million) and Capita Pension Solutions Limited (£6 million) (together, “Capita”). " >https://natlawreview.com/article/uk-ico-fines-capita-ps14-million-following-data-breach
UK ICO Fines Capita £14 Million Following Data Breach

On October 15, 2025, the UK Information Commissioner’s Office (“ICO”) announced a £14 million fine against Capita for failing to ensure the security of p

National Law Review