No Password Required: CISO at RSA and Champion of a Passwordless Future
No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
While the implementation of AI is growing apace, obstacles to deeper adoption still remain. These pressure points are consistent across subsectors: protecting sensitive data; integrating tools with legacy systems; clarifying...more
Welcome to our first issue of 2026 of Decoded -- our technology law insights e-newsletter. As we embark on our seventh year of publishing Decoded, we hope you have found the content interesting and insightful. 2026...more
As organizations across the country adapt to an ever-changing digital environment, 2025 brought a wave of important updates in data privacy and cybersecurity at both the federal and state levels. New and amended state laws,...more
On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more
As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more
In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more
When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden...more
This article examines how cybersecurity teams can leverage AI and LLM technologies like Microsoft Copilot and Open WebUI while managing associated security risks through proper logging and monitoring practices. It provides...more
Let us get right to it. Quantum computing is not just another tech buzzword. It is a seismic shift in how we process information, and that shift has cybersecurity experts on edge. The big deal? Quantum computers — once they...more
Introduction: A Perfect Storm for Cyber Risk - The legal cannabis and hemp industries has become one of the most data-rich, compliance-heavy, and rapidly digitizing sectors in the U.S. Growers, distributors, and...more
On November 13, AI company Anthropic reported that its Threat Intelligence team had disrupted a state‑sponsored Chinese threat actor conducting what is believed to be the first largely autonomous AI‑orchestrated cyber...more
Congress included in the appropriations bill of November 12, 2025, an extension of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), 6 U.S.C. §§ 1501–10, through January 30, 2026....more
Q3 2025 is up +14% from last quarter, a sign that the market is becoming more active, driven by managed & IT services that help organizations to outsource their cybersecurity needs, which has become increasingly important as...more
Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more
Cybersecurity and data privacy matters impact everything around us, including our physical space. Commercial real estate space represents a large part of every city across the globe, whether it is owned or leased. What would...more
The Cybersecurity Act 2018 (the 2018 Act) established Singapore's statutory framework for the oversight and maintenance of national cybersecurity. Its key objectives were to protect critical information infrastructure (CII),...more
October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more
A new cybercrime threat actor calling itself “Coinbase Cartel” has begun targeting transportation, logistics, and adjacent sectors – and you should act quickly to shore up your defenses. Their model is simple: they steal data...more
As cybersecurity threats grow in frequency and sophistication, the ability to respond quickly, precisely, and at scale has become mission-critical for organizations worldwide. When hackers breach your systems, the clock...more
The power of AI is creating new and evolving cyber risks. This article explores those risks, the legal landscape and consequences for organizations in the UK and US that fail to implement sufficient cyber protections, and the...more
The recent shutdown of the federal government has left many critical services in limbo, including the nation’s primary cybersecurity agency. Amid the ongoing budget standoff in Congress, funding for the Cybersecurity and...more
Join Kaylee Cox Bankston and Linda Clark for an engaging and informative webinar on October 29th exploring the most pressing cybersecurity topics of 2025 and beyond. This session will cover the latest threat landscapes,...more
Since 2004, October has marked Cybersecurity Awareness Month and for more than 15 years Wiley’s team of cybersecurity, tech, and government contracts experts has been helping organizations manage cyber risk. On October 21, as...more
The Cybersecurity Information Sharing Act of 2015 (CISA 2015) is set to expire on September 30, alongside a potential government shutdown. (While an extension is included in the House-passed continuing resolution, that bill...more
When a cyber incident strikes, time is short and the stakes are high. Lawyers are often called upon to coordinate response efforts, ensure regulatory and contractual obligations are met, direct third party experts — all while...more