
The Rothaar Report
Musings of a Cybersecurity Evangelist

Teresa Rothaar
Professional freelance copywriter specializing in cybersecurity and cloud. MBA, marathon runner, breast cancer survivor, and X Phile. wildowldigital.com
Latest Posts

Buckle Up, Defense Contractors: Tighter Cybersecurity Standards Are Coming
In theory, U.S. government contractors should be very secure, especially those working for the Department of Defense (DoD). The majority…

How to Protect Your Business and Yourself from Formjacking
Formjacking is a relatively new, frighteningly simple, and dangerously effective cyber attack that grew rapidly in 2018 and is now…

What Is Shadow IT? Understanding the Hazards of Rogue Apps
“Shadow IT” is a broad term referring to any software, device, or service being used on an enterprise network without the knowledge of the…

The Biggest Cyber Threats Facing Businesses Right Now
Enterprise cyberattacks are growing more frequent, sophisticated, destructive, and costly, alarming global investors and c-suite…

GDPR Compliance Has Benefits, But It Doesn’t Ensure Cybersecurity
Compliance with the European Union’s General Data Protection Regulation (GDPR) can be confusing and costly, with organizations reporting…

The Citrix Breach: What Is Password Spraying, Anyway?
If initial accounts from cybersecurity firm Resecurity are accurate, the Citrix Systems breach could turn out to be bad: really, really…

My Thank-You Letter to The X-Files
Dear X-Files:

Cyber Criminals Rake in Half a Mil in Sextortion Bluff
You don’t necessarily have to hack a target to get them to ante up some cash; you just have to make them think you did. This has worked out…

Students & Working Adults Are Mining Cryptocurrency on the Down-Low
Used to be, college students who needed extra money would take on part-time jobs at the mall; working adults would engage in moonlighting…

West Virginia’s Awful, Terrible, Really Bad Idea to Pilot Mobile Voting
You’d have to have been living under a rock (or maybe in an alternate universe) for about the past two years to not know that (1) the U.S…
Reviews
Login to submit your review.