News Archives | Critical Start
Gain full transparency and reduce alert fatigue with CRITICALSTART's managed SIEM powered by Devo.
Webinar Series | Once More unto the Breach | Lessons Learned from Billion Dollar Breaches

Miami-Dade Public Schools Virtual Learning Disrupted by Teen

A 16-year-old student was able to disrupt the Miami-Dade Public Schools e-learning system earlier this week and cause chaos across the district, including the platform virtual-only students have been using, called K12. Police say David Oliveros attends South Miami Senior High.  He was arrested during the early morning hours on Thursday and will face a […]

Read More…

Cybersecurity Threats Grow as Virtual Learning Continues

NASHVILLE, TENN. (WSMV) – As schools are back in session, so are hackers and cyber-criminals looking to take advantage while students and districts continue to adapt to a new style of learning and teaching.  “There wasn’t anything that they necessarily did wrong, it’s just something they weren’t prepared for,” said Randy Watkins, chief technology officer […]

Read More…

China Vows Retaliation After U.S. Ordered Its Houston Consulate Closed Within 72 Hours

China vowed to retaliate Wednesday after the United States abruptly ordered the closure of its consulate in Houston, a move that further inflamed tensions between the two superpowers.  Wang Wenbin, a spokesman for China’s foreign ministry, said China was notified on Tuesday that it must close the consulate within 72 hours. In a regular daily news briefing, he described the action […]

Read More…

Hackers Target Contact Tracing Applications

NBC News and Boston 25’s Blair Miller interviews Quentin Rhoads-Herrera of CRITICALSTART‘s TEAMARES about the vulnerabilities associated with contact tracing and how hackers are targeting companies and individuals through these apps.   Video Transcript: M. Davenport:  Health officials want to know how people are contracting the Coronavirus, who they are catching it from, but one […]

Read More…

Accuracy in AppSec Is Critical to Reducing False Positives

According to a new report from the Neustar International Security Council (NISC), over one-quarter of security alerts fielded within organizations are false positives. Surveying senior security professionals across five European countries and the U.S., the report highlights the need for more advanced and accurate security solutions to help reduce alert-wary cybersecurity teams overwhelmed by massive alert volumes. Alert […]

Read More…

Tennessee Has Just 25 Percent of Recommended Contact Tracers

Tennessee has just 25 percent of the recommended amount of contact tracers, leaving the state 1,500 people short for the critical disease mitigation effort. The National Association of County and City Health Officials is recommending just over 2,040 in Tennessee for its population. Nashville has just 75 contract tracers which needs to be tripled to […]

Read More…

Transparency Key to Heading Off Qualms About Contact Tracing, Experts Say

In late April, Gov. Andrew Cuomo announced the state’s partnership with Bloomberg Philanthropies for New York’s contact tracing program. Last week, New York City started recruiting 1,000 workers to conduct contact tracing. This week, privacy concerns about the initiative have emerged. The focus was not as much on flaws on the tracing program as it was […]

Read More…

Politico: An Unusual Hacking Threat

  The education system might be overlooking an unexpected threat with the whole world moving online: SAT and ACT hacking. Unlike other hacking threats, nation-states and criminals aren’t the primary risks, said Quentin Rhoades-Herrera, director of professional services at computer security firm CRITICALSTART. “Students in the past have hacked their own universities to change their own […]

Read More…

Assessing Your Cyber Risk Impact: Intent vs. Opportunity

Cybersecurity is no longer just a concern for large corporations and government entities. One of the largest attack surfaces today is healthcare where facilities rely on ease of access and fast sharing of data to facilitate immediate and effective care. Breaches in healthcare are occurring more frequently than ever before. According to HIPAA Journal, an […]

Read More…

16 Smart Project-Management Strategies Every Tech Leader Can Use

Task and project management is a must-have skill in the technology industry, especially for tech leaders. Most are handling multiple projects and demands on their time, so it’s important to be able to prioritize and get everything done. As some of the top professionals in the field, the members of Forbes Technology Council have spent years cultivating […]

Read More…

Cybersecurity During a Pandemic: An Interview With CRITICALSTART

Chris Ward speaks with Quentin Rhoads-Herrera of CRITICALSTART to discuss cybersecurity in a time of a pandemic. In our current time of crisis, it’s a sad fact that there are many taking advantage of distracted governments, businesses, and individuals. With the majority of workforces in the Western world currently working from home, often on insecure […]

Read More…

Virtual Draft Makes NFL Teams Potential Targets for Hackers

A hacker could provide entertainment value by disrupting the virtual NFL draft that begins Thursday. Desperation for any sports entertainment shouldn’t make us forget that these things are boring. The few moments of suspense as picks and trades are announced are drowned out by incessant chatter by talking heads and nonstop loops of player highlights. […]

Read More…

Security Versus Convenience

Zoom’s biggest challenge isn’t just fixing its security blunders — it’s doing so while maintaining what makes it so popular in the first place. Zoom has become nearly synonymous with office meetings and socializing as people around the world have adapted to life at home amid the Coronavirus outbreak. That has put the roughly 9-year-old […]

Read More…

5 Things IT Teams Can Learn From Initial Weeks of Telecommuting

In the wake of the ongoing coronavirus pandemic, we have witnessed a surge in telecommuting as more companies transition to remote work. Over the last couple of weeks, we’ve seen a spike in web traffic (including a record-setting number of Zoom calls) as companies make the switch. Initially, there was even concern that this massive onslaught in web traffic […]

Read More…

A researcher found zero-days in one city’s software. Then he realized the problem could be bigger.

For Quentin Rhoads-Herrera, this was not a typical security test. A big municipal government in the U.S. had just handed him the source code for software the city uses to manage contracts and track infrastructure projects. He unpacked the code, sifted through it, and found more than a dozen previously undisclosed vulnerabilities, or zero-days, that a hacker could […]

Read More…

AI’s Great, but It Still Takes Humans to Enforce Cybersecurity

When it comes to protecting computers and information systems from cyber attack, artificial intelligence and machine learning can help — but they’re no cure-all for a growing problem. Notwithstanding the current excitement over AI and its increasing ability to best humans on numerous fronts, it’s no magic bullet for shoring up cybersecurity, says Randy Watkins, […]

Read More…