No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
The Federal Communications Commission issued a notice last week notifying the public that it is accepting comments on the Petition filed by Public Knowledge and the Open Technology Institute at New America, which requests a...more
We have previously reported on hackings of automobiles. Not only can hackings obtain information about your driving habits, your GPS usage and location, the use of your cell phone, access to your contacts, and other...more
Members of the Automotive Information Sharing and Analysis Center (Auto-ISAC) recently released an overview of comprehensive Automotive Cybersecurity Best Practices developed as a proactive measure to further enhance vehicle...more
We have kept abreast of the security vulnerabilities of cars that have been exposed by security researchers. This time, researchers are asking Mitsubishi to recall approximately 100,000 Outlander hybrid vehicles as they were...more
Where the (Class) Action Is - This issue of Roundup wraps up 2015 with another slate of interesting cases spanning industries and subject matter. The running theme of ascertainability is now stretching into antitrust...more
Jeep/Fiat has been sued by a putative class alleging that they were harmed as a result of researchers’ ability to hack into a Jeep and take control of it. Jeep/Fiat filed a motion to dismiss, stating that the owners suffered...more
Fiat Chrysler asked a federal court in Illinois last week to dismiss the proposed class action against it, asserting that inadequate security puts vehicles at risk for hacking after two security researchers were able to take...more