No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity
Dark Web Monitoring - Unauthorized Access Podcast
Join us Wednesday, February 18, from 2 to 3 p.m. EST for the first of our series of six webinars covering trending topics in the Data Security, Privacy & Technology space – “Litigating Data Breaches: Trends, Risks and...more
In the spine-chilling world of cybersecurity, data breaches are monsters that never truly die. Long after headlines fade, the consequences can rise from the grave, bringing reputational harm, legal nightmares, and financial...more
Courts are concluding that not all data breaches should result in a lawsuit. Businesses need to consider causation and damages when responding to an incident and take steps to determine if there is no evidence of harm or...more
When a law firm experiences a data breach, which includes both unauthorized data access as well as disclosure, the consequences extend far beyond reputational harm. Increasingly, attackers exfiltrate entire client...more
According to an AT&T spokesperson, this is not accurate. Social Security Numbers and Dates of Birth were already available in plain text in the original compromised dataset from 2024 (in separate files that could be...more
A recent decision from the Third Circuit suggests that the leak of information onto the Dark Web provides standing to class action plaintiffs in data breach litigation. In Clemens v. ExecuPharm, Inc., 48 F.4th 146 (3d Cir....more
Report on Patient Privacy 21, no. 10 (October, 2021) - A massive data breach at University of New Mexico (UNM) Health may have allowed a third party to obtain medical records from more than 600,000 patients—more than a...more
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more
To establish credibility for their new criminal marketplace, cyber criminals have posted details on over 1,000,000 credit cards, stolen between 2018 and 2019, including card number, CVV number, name and address on the dark...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
As you know, I very rarely download mobile apps. Except for a multi-factor authentication app, and of course, the Jumbo privacy app....more
The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more