No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Major Crypto Exchanges Launch New Products, Obtain Foreign Licenses - According to a recent company blog post, a major U.S. cryptocurrency exchange has launched a new staking product that will allow clients residing in...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
The Current Status of Privacy Laws Across the United States - Unlike the General Data Protection Regulation (GDPR) in the European Union (EU), the United States does not have a nationwide comprehensive data privacy law....more
New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more
CYBERSECURITY - New York Governor Proposes Cybersecurity Regulations for NY Hospitals - On November 13, 2023, Governor Kathy Hochul released proposed cybersecurity regulations applicable to all hospitals located within...more
Understanding the New Pregnant Workers Fairness Act and Full Scope of Pregnancy-Related Discrimination Laws for Schools - On June 27, 2023, the Pregnant Workers Fairness Act went into effect. This new law requires covered...more
Cyberattacks affecting internet-connected medical devices like insulin pumps, intracardiac defibrillators, mobile cardiac telemetry, pacemakers and intrathecal pain pumps have increased in recent years. And such attacks show...more
California Privacy Protection Agency previews draft regulations - On June 8, 2022, less than two months since the California Privacy Protection Agency (“CPPA”) formally took over rulemaking for the California Consumer...more
If you read the hype, then you will have read that lack of regulation, speed of transactions, irreversibility of trades, and hidden identities are positive features of the crypto world. Crypto enthusiasts say that finance can...more
Sports Teams and Messaging Apps Go All-In on NFTs, Potential Hack Foiled - A major U.S. football team has reportedly inked a lucrative sponsorship deal with a popular digital asset platform. According to reports, the...more
US Banks Launch New Stablecoin, Data Shows Increasing Interest in Crypto - In a recent press release, an association of FDIC-insured financial institutions announced the launch of the USDF Consortium (Consortium). The...more
Few things are certain, but it is indisputable that in 2022 data will remain big; data driven technologies will create unparalleled opportunity and risk; the frequency and sophistication of cyberattacks will shatter...more
An international law-enforcement effort has led to the arrest of multiple individuals affiliated with the most prolific ransomware cartel operating today. In November, Justice Department officials announced indictments and an...more
Recently, the Financial Crimes Enforcement Network (FinCEN), a bureau of the U.S. Treasury Department, released a report on ransomware trends stating that during the first half of 2021, 68 different ransomware variants...more
On 14 October 2021, the White House brought together the representatives of more than 30 national governments to address the transnational nature of the threat posed by ransomware attacks. The meeting resulted in a joint...more
CYBERSECURITY - President Biden Signs Executive Order to Strengthen Cybersecurity for Federal Government Following Colonial Pipeline Attack - President Joe Biden signed an Executive Order on Wednesday, May 12, 2021,...more
CYBERSECURITY - Microsoft Releases Additional Resources for Exchange Flaws and CISA Issues Alert - As we alerted our readers last week, Microsoft announced that its Exchange email servers have been compromised, which is...more
CYBERSECURITY - Free Ransomware Service Offered to U.S. Hospitals - The Center for Internet Security (CIS) announced last week that it has launched the Malicious Domain Blocking and Reporting (MDBR) service to assist...more
CYBERSECURITY - OFAC Issues Advisory on Sanctions for Facilitating Ransomware Payments - On October 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an advisory “to...more
UK Government set to move forwards with regulation on consumer IoT device security The UK Government has just announced that it intends to draw up legislation aimed at ensuring that all consumer smart devices sold in the UK...more
What are the biggest, most interesting stories in the ever-changing worlds of cybersecurity, risk mitigation, and information governance?...more
Wage and Hour - Decision Upholds Class Action Waivers in Arbitration Clauses, Resolves Circuit Split - The U.S. Supreme Court issued a long-awaited decision in Epic Systems Corp. v. Lewis on May 21, 2018, holding that...more
Appearing before the House Financial Services Committee Tuesday at a hearing entitled “The Annual Report of the Financial Stability Oversight Council” (FSOC), Treasury Secretary Mnuchin indicated that he intends to discuss...more
Time Inc. announced yesterday that it’s sold itself as part of a roughly $3 billion all-cash transaction to Meredith Corporation. Meredith, which publishes Family Circle and Better Homes and Gardens, among other glossies, is...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more