Latest Posts › Hackers

Share:

Ubiquitous and Creative Fraud is Regular Feature of DeFi

If you read the hype, then you will have read that lack of regulation, speed of transactions, irreversibility of trades, and hidden identities are positive features of the crypto world. Crypto enthusiasts say that finance can...more

Will an Act of War Destroy Your Cyberinsurance Coverage?

Cyberinsurance spurs many complaints from US business. The cost is skyrocketing, retentions (deductibles) are rising quickly, and the insurance companies push their own panel lawyers on customers despite other relationships....more

[Webinar] Moving Targets While Under Fire – Aligning with New Data Laws While Hackers and Customers Bring Pressure - April 5th,...

In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more

Hidden Threats of Exposing Your Phone Number

This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more

Hacking Is Changing: Should Our Data Security Change?

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

The Commercial Gap in Digital Security

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

The Era of Retail Biometric AI Crime Has Begun

Each new technology seems to offer creative tools for both criminals and law enforcement.  Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more

Easy Hacking Tools Facilitate Bad Behavior

A few years ago, if you wanted to wreak havoc online, you needed some skill. You needed to understand coding and how to break into other computers.  You needed to develop attack bots and probe for vulnerabilities....more

New York: Reasonable InfoSec or Not Reasonable InfoSec? That Is The Question.

Last week, the New York State Senate, at the request of the state attorney general, passed the “Stop Hacks and Improve Electronic Data Security Act” (the “Shield” Act). The bill is currently working its way through the New...more

NIST Cybersecurity Framework 1.1: A blueprint for compliance and assurance

In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more

Important Steps to Prepare for the WannaCry Ransomware Attack

Your business may have been victim to the latest ransomware attack, or it may be caught in the next wave. On May 12, 2017, the “WannaCry” ransomware attack compromised over 70,000 organizations in nearly 100...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide