No Password Required: CISO at RSA and Champion of a Passwordless Future
No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more
As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more
2025 saw a range of activity at the intersection of privacy, data security, and national security, including new types of threats, significant U.S. regulatory actions by multiple agencies, legislative lapses and new...more
This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more
In September 2025, we issued a client alert warning about the BRICKSTORM malware campaign and recommended steps to strengthen your organization’s defenses. On Dec. 4, 2025, the Cybersecurity and Infrastructure Security Agency...more
Space and satellite systems underpin a wide range of critical functions, including global communications, navigation, scientific research, defense operations, and essential infrastructure services. As both government and...more
This update (No. 123 | 8 October 2025) covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber...more
On 12 November 2025 the UK Government introduced its highly anticipated Cyber Security and Resilience (Network and Information Systems) Bill (the “Bill”) to Parliament. The Bill is the first major overhaul of cybersecurity...more
On November 13, AI company Anthropic reported that its Threat Intelligence team had disrupted a state‑sponsored Chinese threat actor conducting what is believed to be the first largely autonomous AI‑orchestrated cyber...more
Congress included in the appropriations bill of November 12, 2025, an extension of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), 6 U.S.C. §§ 1501–10, through January 30, 2026....more
When the Colonial Pipeline ransomware attack paralyzed fuel distribution across the East Coast in 2021, both government and private entities raced to exchange cyber threat data to prevent further disruption....more
Congress members have proposed legislation that would introduce new measures to enhance the United States’ cybersecurity resilience in the face of advancing quantum computing capabilities. On August 8, 2025, a bipartisan...more
The Cybersecurity Act 2018 (the 2018 Act) established Singapore's statutory framework for the oversight and maintenance of national cybersecurity. Its key objectives were to protect critical information infrastructure (CII),...more
The United Kingdom’s National Cyber Security Centre (NCSC) has released its Annual Review for 2025. As in 2024, the report covers the UK’s cyber security position as well as the country’s readiness to deal with those threats....more
How are multinationals managing sanctions and export control risks in today’s challenging business environment? Attend ACI’s 15th Annual New York Forum on Economic Sanctions to receive the critical information you need to...more
On October 15, application security vendor F5, Inc. disclosed that a highly sophisticated nation-state threat actor maintained long-term, persistent access to certain F5 systems. The attackers exfiltrated portions of BIG-IP1...more
In 2025, European organizations found themselves navigating an increasingly complex digital landscape, where traditional cybersecurity assumptions were eroded by waves of sophisticated attacks and converging threat groups....more
As Washington barrels through another government funding crisis, the most significant impact on the technology and security landscape isn’t happening in a committee room—it’s the effective shuttering of our nation’s frontline...more
What’s Happening: Recent investigations by leading threat intelligence and incident response teams have identified a sophisticated and persistent cyber campaign leveraging the BRICKSTORM malware, attributed to UNC5221 and...more
Earlier this month, Chinese-linked cyber actors launched a spear-phishing campaign impersonating Representative John Moolenaar, chairman of the House Select Committee on the Strategic Competition Between the United States and...more
The U.S. has joined 12 other nations in releasing a Joint Cybersecurity Advisory providing an update on the Salt Typhoon cyber espionage campaign, as well as new security recommendations for government and private sector...more
U.S. federal agencies, including the Federal Bureau of Investigation (FBI), National Security Agency, and Cybersecurity and Infrastructure Security Agency (CISA), along with security and intelligence agencies from 12 partner...more
A vital cyber defense law known as the Cybersecurity Information Sharing Act of 2015 (CISA 2015) is poised to expire at the end of the month, and leaders in the House and Senate are working to negotiate a replacement within...more
On August 27, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued a Cybersecurity Advisory entitled “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage...more