No Password Required: CISO at RSA and Champion of a Passwordless Future
No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
For small and medium-sized businesses, social media platforms like Facebook and Instagram are essential marketing tools. However, account takeovers by hackers pose a serious and growing threat that every business owner should...more
When I started back in the 401(k) business in 1998, everything was done by paper and telephone. Distribution requests were mailed or faxed. Investment changes were taken over the phone. Beneficiary designations were signed in...more
On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more
Cybersecurity is no longer just an IT or privacy issue. For FDA regulated companies, it’s a patient safety issue, a product quality issue, and increasingly a regulatory enforcement issue. FDA has made it clear that...more
The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more
On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more
Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more
Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more
From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more
The New York Department of Financial Services (“DFS”) has issued the below notice to regulated entities and individuals to use caution before responding to outreach from individuals falsely claiming to represent DFS....more
Technology risks constantly evolve. Effective IT Risk Management Programs can identify, address and, as needed, adapt to emerging risks. This analysis illustrates how an effective IT Risk Management Framework can identify an...more
On 20 and 21 January 2026, the European Commission presented its proposals for a Cybersecurity Act 2 (CSA2) and a Digital Networks Act (DNA). The CSA2 aims to increase Information and Communication Technologies (ICT) supply...more
On January 22, the NYDFS issued an alert informing regulated entities about an email phishing scam falsely claiming to represent the regulator. The alert warned that scammers may have sent emails urging recipients to open...more
The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more
AI is no longer an emerging risk; it is now a central driver of offensive and defensive cyber capabilities. As organizations adopt AI tools to improve efficiency, adversaries are leveraging the same technology to automate...more
While the implementation of AI is growing apace, obstacles to deeper adoption still remain. These pressure points are consistent across subsectors: protecting sensitive data; integrating tools with legacy systems; clarifying...more
Welcome to our first issue of 2026 of Decoded -- our technology law insights e-newsletter. As we embark on our seventh year of publishing Decoded, we hope you have found the content interesting and insightful. 2026...more
Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers. The conversation explores the growing sophistication of...more
The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more
Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more
Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and...more
As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more
European organizations are facing growing operational risks—from cyber threats and regulatory change to supply-chain instability and climate-related disruptions. New regulations such as DORA, NIS2, and the UK Operational...more
On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more
This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more