The Department of Health and Human Services recently issued a health sector alert through the Health Sector Cybersecurity Coordination Center (HC3)....more
4/26/2024
/ Algorithms ,
Artificial Intelligence ,
Centers for Medicare & Medicaid Services (CMS) ,
Cyber Attacks ,
Cybersecurity ,
Department of Health and Human Services (HHS) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Hospitals ,
Machine Learning ,
Popular ,
Social Engineering
Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that...more
On September 5, the Department of Justice (DOJ) settled allegations under the False Claims Act against Verizon Business Network Services LLC, a telecommunications provider. The settlement emphasizes the DOJ’s continued...more
Generative AI has captured the public’s attention and promises to transform the way we live and work. The technology, however, implicates a number of important cybersecurity and privacy considerations for organizations. This...more
Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training,...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse...more
Hannah Sutor is the senior product manager at GitLab and digital privacy advocate at the Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what...more
Tashya Denose is a senior manager of cybersecurity analysis at Capital One and the director of brand and marketing at Black Girls in Cyber. In this episode, Tashya joins the No Password Required team to discuss her passion...more
Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to...more
It’s rainy season for proposed SEC cybersecurity rules. The first watershed was proposed regulations targeting investment companies’ and advisers’ cybersecurity preparedness. See “SEC Plants New Cybersecurity Regulations;...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
5/11/2022
/ Blockchain ,
Criminal Prosecution ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Educational Institutions ,
Grand Theft ,
Hackers ,
Passwords ,
Popular ,
Students
Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick,...more
In the culmination of a process that began in 2016, the Federal Trade Commission (FTC) last week issued a final rule to amend the Standards for Safeguarding Customer Information under the Gramm-Leach-Bliley Act. The...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
9/1/2021
/ Best Practices ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Hackers ,
Malware ,
Popular ,
Ransomware ,
Risk Mitigation
Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more
With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more
On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more
Florida recently joined a small but growing number of states considering sweeping reforms to their data privacy and protection laws. House bill 969, titled “Consumer Data Privacy,” in many ways mirrors the California Consumer...more
With the introduction of the CCPA in January 2020, many other U.S. states have also begun to consider their own proposed data privacy legislation. In this podcast, Elizabeth Reilly from Fidelity National Financial joins...more
2/6/2020
/ ALTA ,
California Consumer Privacy Act (CCPA) ,
Compliance ,
Consumer Data Requests ,
Consumer Privacy Rights ,
Data Management ,
Data Mapping ,
Data Privacy ,
Duty to Delete ,
Land Titles ,
Popular ,
Privacy Laws
Florida lawmakers have proposed data privacy legislation that, if adopted, would impose significant new obligations on companies offering a website or online service to Florida residents, including allowing consumers to “opt...more
1/15/2020
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Gramm-Leach-Blilely Act ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Governance ,
Legislative Agendas ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Privacy Policy ,
Proposed Legislation ,
Proposed Regulation ,
Regulatory Agenda ,
Risk Management ,
Rulemaking Process ,
State and Local Government ,
Websites
California passed a sweeping new privacy law that will impact many businesses. The California Consumer Privacy Act of 2018 (CCPA) is the first U.S. law to grant consumers extensive rights as to their personal information and...more
10/22/2019
/ Banks ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Gaming ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
lender ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
State and Local Government ,
Transparency
On October 11, 2019, the California AG published its long-awaited proposed regulations to implement the CCPA. This podcast describes a few key points from those draft regulations, including as they relate to online privacy...more
California’s new privacy statute imposes a number of new requirements on businesses that touch the personal information of California consumers. Its reach includes banks and financial services companies....more
8/30/2019
/ Banks ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Customer Privacy ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws