No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
My mother-in-law lives on a farm in rural Oklahoma. Living out in the country was a dream of my in-laws for a long time, and after retiring, they made it a reality over 19 years ago. They bought 43 acres of land, and the goal...more
Just weeks after Mexico’s central bank was targeted by hackers who stole $15 million, Chile’s biggest bank, Banco de Chile announced on May 28, 2018, that it had been struck by a “virus,” that affected its workstations,...more
Happy National Cybersecurity Awareness Month. I wish it was more uplifting than the current state of affairs, but it has never been so important. ...more
In light of recent high-profile breaches of highly sensitive data, this is a good time to remind individuals of how to protect their identity and credit information....more
As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more
As if there weren't enough concerns over the security of your banking and credit card accounts – thefts of card numbers, card skimmers and online account hacking, to name a few....more
UK-based Tesco Bank froze online transactions on Monday after discovering that cyber-criminals stole money from 20,000 different customer accounts. The exact method used by the perpetrators is still under review, but...more
The coverage landscape for “Business E-mail Compromise” (BEC) scams remains somewhat tenuous, as organizations and carriers continue to battle in court over the extent of coverage. Although recent positive,...more
Federal regulators unveiled a proposal yesterday that would push the country’s biggest banks and other “critical financial companies” to shore up cybersecurity protocols, to prevent hacks, and to have a recovery plan at the...more
The Deal Professor weighs in on Yahoo’s announcement last week of the hack of roughly 500 million of its customers’ data and the specter of the MAC (material adverse change) that Verizon may choose to invoke to dance away...more
Well, see, Yahoo just doesn’t have enough on its plate these days. So why not the revelation that hackers stole data on 500 million users in 2014? The hack—thought to be a state-sponsored affair—is likely the biggest data...more
US regulators are “ramping up oversight” of Swift—the financial messaging system used throughout global finance that’s been a key conduit for hackers in recent attacks of Bangladeshi and Ecuadorian banks....more
Hundreds of Quincy Credit Union (Massachusetts) customers reported that unauthorized ATM withdrawals were made from their accounts over the holiday weekend. Officials now believe that skimmers were placed on ATM machines in...more
As we head into the end of 2015, state legislators across the country continue to strengthen, update and, in some instances, broaden the scope of their respective state data breach notification laws. Specifically, many...more