No Password Required: CISO at RSA and Champion of a Passwordless Future
No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
Somewhere right now, an adversary is quietly siphoning encrypted financial data off a major bank’s network—not to read it today, but to crack it open the moment quantum computers catch up....more
Welcome to our second issue of 2026 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at recent guidance from HHS urging healthcare providers to step up cybersecurity efforts,...more
Security researchers at Huntress Labs have identified a vulnerability in SolarWinds’s Web Help Desk that threat actors are exploiting to allow them to execute code remotely....more
For small and medium-sized businesses, social media platforms like Facebook and Instagram are essential marketing tools. However, account takeovers by hackers pose a serious and growing threat that every business owner should...more
Following the UK Government's launch of a public consultation on its proposed legislative measures to combat the threat of ransomware (see Goodwin’s January 2025 analysis), the UK Government published its response to the...more
When I started back in the 401(k) business in 1998, everything was done by paper and telephone. Distribution requests were mailed or faxed. Investment changes were taken over the phone. Beneficiary designations were signed in...more
On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more
Cybersecurity is no longer just an IT or privacy issue. For FDA regulated companies, it’s a patient safety issue, a product quality issue, and increasingly a regulatory enforcement issue. FDA has made it clear that...more
News Briefs - Physicians Seeing Major Benefits to Using Ambient AI Scribes - Ambient AI scribes are being hailed by physicians as a game changer that helps free them to focus on their patients rather than their computer...more
The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more
Congress has renewed the Cybersecurity Information Sharing Act of 2015 (CISA 2015) until September 30, 2026, as part of the spending bill signed by the president yesterday, February 3, 2026. The renewal comes as welcome news...more
Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more
On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more
An email phishing scheme is circulating that targets development applicants by impersonating local planning staff and demanding payment of an “Application Approval Fee” invoice. The messages claim that paying the invoice is a...more
As the cannabis industry continues to grow and evolve, so do the challenges it faces, particularly in the realm of cybersecurity. With increasing digitization, cyber threats pose a significant risk to cannabis businesses,...more
Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more
We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more
Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more
From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more
The New York Department of Financial Services (“DFS”) has issued the below notice to regulated entities and individuals to use caution before responding to outreach from individuals falsely claiming to represent DFS....more
Technology risks constantly evolve. Effective IT Risk Management Programs can identify, address and, as needed, adapt to emerging risks. This analysis illustrates how an effective IT Risk Management Framework can identify an...more
On 20 and 21 January 2026, the European Commission presented its proposals for a Cybersecurity Act 2 (CSA2) and a Digital Networks Act (DNA). The CSA2 aims to increase Information and Communication Technologies (ICT) supply...more
On January 22, the NYDFS issued an alert informing regulated entities about an email phishing scam falsely claiming to represent the regulator. The alert warned that scammers may have sent emails urging recipients to open...more
The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more
AI is no longer an emerging risk; it is now a central driver of offensive and defensive cyber capabilities. As organizations adopt AI tools to improve efficiency, adversaries are leveraging the same technology to automate...more