GET UP TO SPEED ON ALL THINGS CYBER
We facilitate the exchange of crowdsourced cyber insights, experiences and differing opinions that challenge the status quo.
Our mission is to elevate cybersecurity awareness and defense through the content we generate. All of our original content is steered by our Content Advisory Committee, comprised of cyber leaders that you recognize and trust.
Our audience is diverse, ranging from CXO and board members, to members of the public with an interest in IT security such as students and business owners. Discussions address topics in business and personal security. Content published on Cyber Business Review is always ungated and freely available.
LATEST CYBER NEWS
02/02/2024 U.S. government sanctions Iranian officials over Pennsylvania water facility hack
The Iranian attack targeted a device manufactured by an Israeli company. (read more)
- - - - - - - - - - - - - - - - - - - - - -
01/29/2024 Wow! Mother of all breaches reveals 26 billion records: what we know so far
The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records. (read more)
- - - - - - - - - - - - - - - - - - - - - -
01/22/2024 Smartphone ambient light sensors allow spying
Android and iPhone ambient light sensors can be turned into cameras, allowing malicious actors to secretly film unsuspecting victims and their surroundings. (read more)
Twitch, Breached. A Hacktivism Reboot?
14-February | Written by Jean Loup P. G. Le Roux
A few weeks ago, the whole world reeled on the news that Twitch had been hacked. Millions of people instantly flocked to haveibeenpwned.com to see if their emails had been compromised and quickly changed their passwords.
IoT Security: New US Regulation to the Rescue!
5-March | Written by Jean Loup P. G. Le Roux
The many security problems linked to the Internet of Things (IoT) is not a new subject - cybersecurity experts have been warning everyone about these vulnerabilities for a long time now. While manufacturers have refused to heed these warnings (for the most part), legislation is now finally catching up.
Cybersecurity Attacks in 2020: How Bad Did It Get?
23-November | Written by Jean Loup P. G. Le Roux
As we wrap up 2020, it's time to reflect back on this pivotal year that was from a cybersecurity perspective. Jean Loup P.G. LeRoux, CEO of I&I Strategy, shares his insights on cyber-related highlights and lowlights. He also offers some personal suggestions on how companies can ramp up their cyber posture as we head into 2021. – Steve Tso
What the Twitter Hack Proves About Private Communications (Not Another Bitcoin Article)
1-October | Written by Jean Loup P. G. Le Roux
Back in July 2020, Twitter announced that 130 accounts had been hacked. The hackers tweeted from 45 of them from, 36 had their direct messages accessed, and 7 accounts had their data downloaded. How does a company as large and as sophisticated as Twitter get hacked? Jean Loup Le Roux takes a deep dive into what happened, and discusses ways for future prevention. – Steve Tso
How can someone legally access your data in the cloud [without you knowing]?
2-July | Written by Jean Loup P. G. Le Roux
Whenever the topic of unauthorized cloud data access surfaces, most point to cyberattacks as the expected culprit. Yet, there are LEGAL avenues for organizations to access your cloud data. Jean Loup P. G. Le Roux takes a look at two possible ways this can be done- through “jurisdiction” and “regulatory” systems and outlines what you can do to protect yourself against this. - Steve Tso
SUBSCRIBE TO OUR NEWSLETTER
to receive news and updates
By signing up, you agree to our Privacy Policy.