No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
The Times digs into what it’s calling private equity’s “conquer[ing of] the American tax system”—where “slight-of-hand tax-avoidance strategies” are so “aggressive” and pervasive that “at least three private equity officials...more
Thursday’s highly anticipated Consumer Price Index update showed that prices “rose in May at the fastest rate since 2008, a bigger jump than economists had expected.” The 5% increase comes as prices “are rising for many goods...more
After a series of denials, it has emerged that Colonial Pipeline reportedly paid 75 Bitcoin (roughly $5 million) to recover its stolen data from last weekend’s ransomware attack. The move likely put a quicker end to the...more
A cyberattack over the weekend forced the shutdown of one of America’s largest pipelines for refined gas and jet fuel. Operator Colonial Pipeline revealed late Friday that it had “shut down its 5,500 miles of pipeline, which...more
The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more
Amazon a juggernaut? Quarterly sales and profit prove how indispensable tech giants have become to our society. In the midst of a pandemic, Big Tech mostly shows gains....more
Apple announced that the coronavirus outbreak that’s brought Chinese manufacturing to a near-standstill and continues to spread around the world will affect its quarterly sales expectations. The news makes Apple “one of the...more
A mounting death toll (over 106 and counting) and fears of a coronavirus pandemic sent markets tumbling early on Monday and kicked off a selloff that continued all day....more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
The latest on Uber’s Friday IPO includes new details on its anticipated pricing, which for now looks to come in at the midpoint of its $44-50/share range [though demand is probably strong enough for the company to shoot for...more
Google has announced plans to shutter Google Plus, its “floundering answer to Facebook,” following the discovery of a security vulnerability that “exposed the private data of up to 500,000 users of the service.” Google...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
Tesla’s rise to the top of the US car heap in terms of market value raised a lot of eyebrows a few months ago. GM bumped it back down yesterday, but its three months as #1 marked what felt like a serious shift in the auto...more
With oil markets again in free fall, Saudi Arabia and Russia have agreed to cut production, and industry experts expect that the rest of OPEC may soon follow suit....more
News emerged in past weeks that North Korean hackers were likely behind the theft of $81 million from the central bank of Bangladesh. You can add to that an attack on more than 20 Polish banks and an attempt at other...more
A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more
Those of you with Amazon Prime Now accounts love the convenience of getting goods delivered to your home RIGHT NOW, well at least within hours until Amazon drones become common place....more