If you read the hype, then you will have read that lack of regulation, speed of transactions, irreversibility of trades, and hidden identities are positive features of the crypto world. Crypto enthusiasts say that finance can...more
4/28/2022
/ Bitcoin ,
Criminal Prosecution ,
Crypto Exchanges ,
Cryptocurrency ,
Cyber Crimes ,
Decentralized Finance (DeFi) ,
Financial Transactions ,
Fraud ,
Hackers ,
Investment Fraud ,
Korea ,
Ponzi Scheme ,
Regulatory Agenda ,
Romania ,
Russia ,
Scams
Cyberinsurance spurs many complaints from US business. The cost is skyrocketing, retentions (deductibles) are rising quickly, and the insurance companies push their own panel lawyers on customers despite other relationships....more
3/24/2022
/ Cyber Attacks ,
Cyber Insurance ,
Hackers ,
Lloyds of London ,
Malware ,
Military Conflict ,
Policy Exclusions ,
Policy Terms ,
Ransomware ,
Russia ,
Ukraine
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
11/19/2021
/ ATDS ,
Bots ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Digital Wallets ,
Hackers ,
Mobile Apps ,
Multi-Factor Authentication ,
Online Banking ,
Phishing Scams ,
Phone Numbers ,
Popular ,
Spyware
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago?
The history of network and cyber security seems to be a...more
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
Each new technology seems to offer creative tools for both criminals and law enforcement. Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more
A few years ago, if you wanted to wreak havoc online, you needed some skill. You needed to understand coding and how to break into other computers. You needed to develop attack bots and probe for vulnerabilities....more
Last week, the New York State Senate, at the request of the state attorney general, passed the “Stop Hacks and Improve Electronic Data Security Act” (the “Shield” Act). The bill is currently working its way through the New...more
In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more
4/23/2018
/ Cloud Service Providers (CSPs) ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Data Protection Officers (DPOs) ,
Executive Orders ,
Hackers ,
Internet of Things ,
NIST ,
Point of Sale Terminals ,
Popular ,
Public Safety ,
Regulatory Requirements ,
Risk Management ,
Self-Regulatory Organizations ,
Trump Administration
Your business may have been victim to the latest ransomware attack, or it may be caught in the next wave.
On May 12, 2017, the “WannaCry” ransomware attack compromised over 70,000 organizations in nearly 100...more
The cyber war battlefield has expanded, and your business is now a fighter and a target.
A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more