No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
CYBERSECURITY - FBI Warning: M&A Activity Targeted by Ransomware Groups - The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant...more
More details on that massive ransomware hack that hit Colonial Pipeline over the weekend. The FBI has confirmed that hacking group DarkSide was responsible and that it’s “looking for any ties the group might have to...more
CYBERSECURITY - Free Ransomware Service Offered to U.S. Hospitals - The Center for Internet Security (CIS) announced last week that it has launched the Malicious Domain Blocking and Reporting (MDBR) service to assist...more
CYBERSECURITY - Greater Baltimore Medical Center Hit with Ransomware - The Greater Baltimore Medical Center (GBMC) was hit with a ransomware attack over the weekend (December 5-6) that potentially delayed procedures planned...more
CYBERSECURITY - Q3 Coveware Report: Unsettling Update on Ransomware - We spend a lot of time reporting on ransomware because we are seeing more incidents than ever before, and our readers comment that keeping them up to...more
CYBERSECURITY - Chinese and Russian Hackers Targeting COVID-19 Vaccine Makers in U.S. Crosshairs - Last week, authorities from the United States, the United Kingdom and Canada accused a well-known hacker group tied to...more
A mounting death toll (over 106 and counting) and fears of a coronavirus pandemic sent markets tumbling early on Monday and kicked off a selloff that continued all day....more
Autonomous Shuttle Launches in Brooklyn- Optimus Ride has launched the first self-driving shuttle in New York City, which will transport passengers between the ferry and the Brooklyn Naval Yard. Approximately 500 passengers...more
The attackers behind the vicious ransomware known as GandCrab have made their money (loosely estimated at over $2 billion) and are retiring. Most of us work for a living and then retire, but these guys steal money to retire....more
For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well, maybe not for the holiday reading list. We need to be careful not to bring up the results...more
Non-profit organizations collect, use and disclose personal information just like any other for-profit industry. However, non-profit organizations often don’t have the same resources to devote to data security as their...more
Issues of cybersecurity in vehicles are high on consumers’ list of concerns in buying new vehicles. It also impacts public perception of self-driving cars, with a 2017 Cox Automotive survey finding 40% of consumers expressed...more
Russians Continue to Attack U.S. Energy and Power Sectors - Late last week, a joint statement by the Department of Homeland Security and the Federal Bureau of Investigation confirmed that the Russian government has been...more
Driverless cars and driver-assist systems are poised to change transportation as profoundly and as quickly as the internet has changed shopping and communications. Examples of the first wave of this technology that is on the...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - United States and China Renew Promise Not to Hack - On October 4, U.S. and Chinese officials agreed to not engage in targeted hacking. Per a...more
This month, Colorado joined a growing list of nearly half of U.S. states when it enacted a law approving the use of autonomous driving systems. The Colorado law governs systems capable of controlling highly and fully...more
A series of cyberattacks featuring ransomware rocked the world this weekend, and the aftershocks “could linger” for a while....more
In this hoganlovells.com interview, Dr. Sebastian Lach discusses the massive liability shift that will occur as autonomous vehicles (AV) hit the roadways and the factors that will influence how insurers calculate risk....more
Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more
At this year’s Consumer Electronics Show, automotive technology continued its growing role at the show and shared the spotlight with virtual and augmented reality systems, video recording toothbrushes, and smart home products...more
New NHTSA guidance represents the federal government’s first attempt to develop a comprehensive regulatory structure for automated vehicles. This transformative technology offers vast promises and significant concerns...more
The California Supreme Court agreed to hear Yelp’s case arguing that requiring the company to remove a one-star review of a law firm “creates a gaping hole” in the immunity that shields internet service providers from suits...more
On April 28, 2016, four members of the U.S. House of Representatives launched a bipartisan caucus dedicated to addressing security and safety concerns raised by new innovation in connected and autonomous vehicles (or...more
Driving in America: It’s a task almost universally reviled by those with hour-long commutes, practically a right-of-way to adulthood, a pastime romanticized in films, and – maybe – a soon extinct activity? Ever since Google...more
Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more