Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s "Breakthrough” series episode “Cyber...more
Bianca Lewis, also known by her hacker handle BiaSciLab, is a next-generation teenage hacker and the CEO of Girls Who Hack. Bianca’s cybersecurity journey started at age 11 when she was part of a team that successfully...more
Serge Jorgensen is a founding partner and CTO of Sylint Group, where he provides response and remediation guidance on international espionage incidents, cybersecurity attacks, and counter cyberwarfare. An engineer by...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
5/11/2022
/ Blockchain ,
Criminal Prosecution ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Educational Institutions ,
Grand Theft ,
Hackers ,
Passwords ,
Popular ,
Students
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
9/1/2021
/ Best Practices ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Hackers ,
Malware ,
Popular ,
Ransomware ,
Risk Mitigation
Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more
With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
6/29/2021
/ Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Ransomware
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The Baltimore city government's email and other systems have been offline for more than three weeks as the result of a ransomware attack in early May. This is not the first local government to have been the victim of such...more
6/3/2019
/ Administrative Agencies ,
Civil Liability ,
Cyber Attacks ,
Data Breach ,
Email ,
Emergency Response ,
First Responders ,
Hackers ,
Information Technology ,
Municipalities ,
Personally Identifiable Information ,
Ransomware ,
State and Local Government
I. Legal Exposure to Federal and State Privacy Laws -
A. Federal Statutes and Enforcement -
1. Federal Trade Commission Act, 15 U.S.C. §§ 41-58 -
The Federal Trade Commission (FTC) has emerged as the leading...more
3/1/2016
/ Breach Notification Rule ,
Communications Act of 1934 ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Security ,
EU ,
EU-US Privacy Shield ,
Fair Credit Reporting Act (FCRA) ,
FCC ,
Federal Trade Commission (FTC) ,
FTC Act ,
Gramm-Leach-Blilely Act ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Intellectual Property Protection ,
Malware ,
US-EU Safe Harbor Framework
Shortly after the massive 2013 Target data breach, shareholders filed four derivative lawsuits against the company’s directors and some of its officers (13 CARE 624, 3/20/15). The shareholders alleged that the defendants had...more
8/17/2015
/ Caremark claim ,
Corporate Counsel ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Derivative Suit ,
Derivatives ,
Fiduciary Duty ,
Hackers ,
Home Depot ,
Information Security ,
Popular ,
Securities and Exchange Commission (SEC) ,
Shareholders ,
Target ,
Wyndham ,
Young Lawyers
Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more
7/20/2015
/ C-Suite Executives ,
CEOs ,
CFOs ,
Compliance ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Department of Justice (DOJ) ,
Email ,
FBI ,
Hackers ,
Phishing Scams ,
Software ,
Wire Fraud