No Password Required: Founder of ThreatLocker and the Zero-Trust Revolution
Dinsmore's Herb Stapleton Discusses Reducing Cybercrime Risk
No Password Required: Starbucks’ Security Pro Went From Cyber Competitions to Corporate Red Teaming
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Former FBI Executive and Cybersecurity Leader Herbert Stapleton Joins Dinsmore’s National Corporate Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Justice Insiders Podcast - Human Beings: Cybersecurity's Most Fragile Attack Surface
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
2023 DSIR Deeper Dive: State Privacy and Data Collection
On January 29, 2026, the Federal Communications Commission’s (“FCC” or the “Commission”) Public Safety and Homeland Security Bureau issued a Public Notice (DA 26-96) to highlight best practices that communications providers...more
The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more
The Federal Communications Commission's (FCC) Public Safety and Homeland Security Bureau (Bureau) recently released a public notice (Notice) emphasizing the threat of ransomware to communications networks and urging providers...more
Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more
What determines whether a ransomware event becomes a controlled disruption or a full blown crisis? In this episode of The Cyber Periscope, Pam Signorello sits down with Dr. Stephen Boyce, CEO and President of The Cyber...more
Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more
We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more
Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more
From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more
The National Institute of Standards and Technology (NIST) recently released their initial preliminary draft of NIST IR 8596, also known as the Cybersecurity Framework Profile for Artificial Intelligence. This new...more
The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more
The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more
Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more
As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more
On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more
This year, organisations around the world are being offered the opportunity to acquire their own branded internet extensions: ".BRAND" top-level domains. Moving your brand from the left of the dot(.) to the right of the...more
The Federal Trade Commission (FTC) announced a proposed consent order with Illusory Systems Inc. (Illusory), a Utah-based blockchain infrastructure company that operates the Nomad Token Bridge. The settlement resolves the...more
Dental support organizations (DSOs) sustained notable expansion activity in late 2025. The November 2025 DSO Deal Roundup highlights that multiple platforms grew through both affiliations and de novo practice openings in...more
Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more
Europe’s gateway to the cosmos has stumbled on terrestrial ground, reminding the global research community that the most advanced engineering ambitions remain tethered to fragile digital infrastructures. On December 30, 2025,...more
A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more
Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more
What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more
On 18 December 18, 2025, the European Union (EU) added 41 vessels to its sanctions list, targeting Russia’s so-called “shadow fleet,” an opaque network of tankers used to circumvent restrictions on Russian oil exports. The...more
In a well-reasoned recent opinion, an Illinois appellate court strictly construed a cyber policy, ruling that reasonable—but contractually unnecessary—payments made by an insured following a cyberattack did not constitute...more