No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Nike was hit with a proposed securities class action on Friday accusing the athletic apparel giant of touting its nonfungible tokens before abruptly abandoning that business, in a “brazen rug pull” that left purchasers of...more
Crypto Offerings Launch by Major Investment Bank, Asset Manager and Insurer - According to a recent report, a major multinational investment bank and financial services firm is now allowing its investment advisors to pitch...more
It’s very hard to keep up with digital and crypto lingo. But if you are dabbling in crypto, you need to know about rug pulls. What is a rug pull you ask? According to blogger Migi Delfin, “A rug pull is a fraud scheme that...more
Cryptocurrency platform Poly Network, which allows users to swap different types of digital tokens, was the victim of a cryptoheist that resulted in the thief (allegedly just one hacker) to swipe over $600 million of...more
We have definitely seen an uptick in the number of ransomware attacks against municipalities around the country. Thus far, the attacks have been against single cities, towns, and court systems, and recently against a...more
You’ve heard this before, but it still holds true – cryptocurrency regulations are coming. Everyone knows they’re inevitable, and there has been some trepidation amongst investors that regulations will disrupt innovation and...more
Cyber attacks continue to be a pervasive and destructive threat to all institutions and the legal and regulatory landscape currently in place to address those threats continues be reshaped in an effort to address those...more
AT&T’s chief is weighing in the DOJ’s call to sell CNN in order to make its deal with Time Warner go through, and, as Randall sees it, “selling CNN makes no sense”....more
On July 25, 2017, the U.S. Securities and Exchange Commission (the “SEC”) published an investigative report (the “Report”) cautioning market participants that the offer and sale of digital assets such as “coins” or “tokens,”...more
The U.S. Securities and Exchange Commission (SEC) has recently taken several actions to make clear that it is focused on and actively monitoring the rapidly growing market for so-called “token sales” or “initial coin...more