No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
1. Help employees manage their individual privacy - Encourage employees to update their individual account privacy settings by visiting Update Your Privacy Settings on staysafeonline.org. ...more
A mounting death toll (over 106 and counting) and fears of a coronavirus pandemic sent markets tumbling early on Monday and kicked off a selloff that continued all day....more
Ride-hailing company Uber has resolved EEOC charges related to its alleged “culture of sexual harassment” and will “start a $4.4 million class fund to compensate victims of sexual harassment or retaliation from as early as...more
I am tempted to write something along the lines of “another month, another scandal at Uber” but I do not think that would really help any compliance professional or business executive learn from the latest FUBAR announced by...more
AT&T’s chief is weighing in the DOJ’s call to sell CNN in order to make its deal with Time Warner go through, and, as Randall sees it, “selling CNN makes no sense”....more
It is the dust in end that Equifax created from its statements over the past week and actions which led to the massive data breach in the first place. The former head of the company, Richard Smith, testified before Congress...more
Yahoo—via new parent Verizon Communications—has officially tripled its estimate of the number of accounts affected by its 2013 cyber hack, putting the total at a staggering 3 billion (aka, all of them)....more
Well, see, Yahoo just doesn’t have enough on its plate these days. So why not the revelation that hackers stole data on 500 million users in 2014? The hack—thought to be a state-sponsored affair—is likely the biggest data...more
Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more
A new report released by Osterman Research, sponsored by Actiance, GWAVA and Smarsh, tells us that social media is one of the biggest security threats for companies. Malware is increasingly making its way into companies via...more