No Password Required: CISO at RSA and Champion of a Passwordless Future
No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
Following the UK Government's launch of a public consultation on its proposed legislative measures to combat the threat of ransomware (see Goodwin’s January 2025 analysis), the UK Government published its response to the...more
On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more
The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more
As the cannabis industry continues to grow and evolve, so do the challenges it faces, particularly in the realm of cybersecurity. With increasing digitization, cyber threats pose a significant risk to cannabis businesses,...more
Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more
The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more
Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers. The conversation explores the growing sophistication of...more
Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more
2025 saw a range of activity at the intersection of privacy, data security, and national security, including new types of threats, significant U.S. regulatory actions by multiple agencies, legislative lapses and new...more
What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more
What happens when the familiar faces of trusted clients, coworkers, and peers turn out to be AI-generated imposters? In this episode of The Cyber Periscope, Pam Signorello sits down with Nate Lovett of Wiley's Cyber Insurance...more
In today’s digital landscape, businesses of every size face a growing number of cybersecurity threats. From sophisticated spear phishing campaigns to disruptive malware, cyberattacks are no longer a question of if, but when....more
The statistics listed in the Quarterly Threat Report: Third Quarter, 2025, issued by Beazley Security are eye popping. They include: August and September showed a sharp increase in ransomware activity, with those months...more
A November 13, 2025, a Cybersecurity Advisory warned that new activity by the Akira ransomware variant “presents an imminent threat to critical infrastructure.” The Advisory was jointly issued by four U.S. agencies, the...more
Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more
When the Colonial Pipeline ransomware attack paralyzed fuel distribution across the East Coast in 2021, both government and private entities raced to exchange cyber threat data to prevent further disruption....more
Welcome to the premiere episode of The Cyber Periscope, where Pam Signorello sits down with Bill Knauss, special counsel in Wiley's Insurance Practice, to discuss the 2025 NetDiligence Cyber Claims Study, the evolving...more
In today’s landscape of evolving cyber threats, assuming your business is safe is no longer an option – it’s time to take proactive steps to defend against cyberattacks. In the arms race between cyberattacks and organizations...more
A new report from Anthropic, a leading Artificial Intelligence (AI) company, highlights a troubling development in the cybersecurity landscape: threat actors are now using AI to automate nearly every step of a cyber extortion...more
On the Rise: Cyberattacks through the supply chain have increased by over 400% in recent years. Leaders need to take action. Enhance Third-Party Cybersecurity: Regularly audit suppliers’ cybersecurity practices and limit...more
The United Kingdom’s National Cyber Security Centre (NCSC) has released its Annual Review for 2025. As in 2024, the report covers the UK’s cyber security position as well as the country’s readiness to deal with those threats....more
A new cybercrime threat actor calling itself “Coinbase Cartel” has begun targeting transportation, logistics, and adjacent sectors – and you should act quickly to shore up your defenses. Their model is simple: they steal data...more
Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more
In 2025, European organizations found themselves navigating an increasingly complex digital landscape, where traditional cybersecurity assumptions were eroded by waves of sophisticated attacks and converging threat groups....more
A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more