No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Life With GDPR: Critical Perspectives on Big Law Firm Cybersecurity
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
State AG Pulse | CT AG Reacts to Genetic Data Breach
Cybersecurity in Video Games & Esports
2023 DSIR Deeper Dive: State Privacy and Data Collection
As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more
As applications and use cases for digital assets and their blockchain infrastructure grow and become more sophisticated, investments and valuations for businesses in these areas have grown as well. The growing number of...more
Australia welcomes new business and foreign investment by providing a strong economy, a stable political environment and a skilled and talented workforce. Our comprehensive guide to Doing Business in Australia has been...more
According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25, 2023, “hackers have stolen $4.4 million in cryptocurrency using private keys and...more
This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more
In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more
Information governance (IG) plays an increasingly significant role of the way corporations do business. But what do organizations do with all their data? Where do they store it—and is it secure, well organized, and...more
Earlier this month, the International Organization of Securities Commissions (IOSCO) released draft policy recommendations to support greater regulatory and oversight consistency within the crypto and digital assets markets....more
A California federal court recently held that all governance token holders were responsible for any losses suffered in a security incident. Specifically, the court, in denying a motion to dismiss, ruled in part in favor of a...more
New York’s Department of Financial Services (“DFS”) recently announced a $100 million settlement with Coinbase, Inc., one of the world’s largest cryptocurrency exchanges, for Bank Secrecy Act/Anti-Money Laundering (“BSA/AML”)...more
The term “metaverse” first appeared in 1992 as an abstract concept in Neal Stephenson’s dystopian novel Snow Crash. Two decades later, the Metaverse has since evolved from a mere idea to a figment of everyday reality, as it...more
In June, OpenSea revealed user email addresses were compromised due to vendor employee error. As virtually all NFT investors do, if you have an OpenSea account then you likely had your email address leaked in late June due to...more
The Data Security Incident Response Report features insights and metrics from 1,270+ incidents that members of the firm’s DADM Practice Group helped clients manage in 2021. This episode takes us deeper into forensics....more
Avoiding Data Breaches: A Guide for Boards and C-Suites "Recently, plaintiffs have targeted corporate board members and C-level executives alleging that their data privacy–related claims result from a breach of fiduciary...more
Britain Announces Plans to Mint Its Own NFT as It Looks to ‘Lead the Way’ in Crypto - "Glen said the government was also 'widening' its gaze to look at other aspects of crypto, including so-called Web3, a movement that...more
Can you say 0 to 60? Not cars, but pretty much everything to do with financial services. A new year, a new administration, and new challenges for providers. Prior CFPB Director Kraninger is long gone. Acting Director Uejio...more
Creation of a new rapid response team signals regulators may turn today’s cyber examination priorities into tomorrow’s enforcement priorities. The Securities and Exchange Commission, New York State Department of Financial...more
FINRA held its bi-annual Cybersecurity Conference in January and recently published five take-away real-world experiences from the conference...more
Editors’ Note: This is the first in our start-of-year series examining important trends in white collar law and investigations in the coming year. Up next: a look at trends in health care enforcement. Look for additional...more
On November 1, 2019, Digital Asset Exchange BitMEX announced that a substantial volume of its customers’ email addresses had been inadvertently leaked in email communications. While the precise nationalities and identities of...more
The Wolcott school system in Wolcott, Connecticut has been recovering for four months from a ransomware attack that hit its system at the end of the school year. Last week, it was hit with a second attack. According to...more
As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more
Players of the popular Fortnite video game have filed a proposed class action suit against the video game’s owner, Epic Games Inc. (“Epic”) alleging that Epic failed to protect players’ accounts, allowing hackers access to...more
Just before the new year, the Department of Health and Human Resources (HHS) released voluntary cybersecurity practices for health care organizations, which consists of a main document, two technical volumes, and resources...more
On June 27, 2018, the State of Connecticut Treasurer’s Office announced that about $1.4 million had been stolen from Connecticut Higher Education Trust (CHET) college-savings accounts. This theft resulted from data security...more