No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor
No Password Required: Founder of ThreatLocker and the Zero-Trust Revolution
We get Privacy for work — Episode 12: Managing Competing Priorities: Data Breach Notification Laws and Trade Secrets
We get Privacy for work — Episode 11: Beyond the Checkbox: Engaging Your Workforce in Privacy and Data Security Training
Dinsmore's Herb Stapleton Discusses Reducing Cybercrime Risk
AI Governance Strategies to Safeguard Your Workplace: What's the Tea in L&E?
From “Houston, We Have a Problem” to Workplace Safety: Lessons from Apollo 13 - Hiring to Firing Podcast
From Concerts to Crisis: Navigating Workplace Scandals — Hiring to Firing Podcast
5 Key Takeaways | The Law of the Machine (Learning): Solving Complex AI Challenges
5 Key Takeaways | Faulty Intelligence: Responding to an AI Incident
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Cybersecurity in Video Games & Esports
2023 DSIR Deeper Dive: State Privacy and Data Collection
On November 13, 2025, India’s Ministry of Electronics and Information Technology finalized the Digital Personal Data Protection Act (DPDP) Rules (Rules), allowing the DPDP to come into effect....more
On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps and social media...more
On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more
January is Data Privacy Awareness Month, an appropriate time for employers to assess how they collect, use, store, and protect employee personal information. While much of the public discourse around data privacy focuses on...more
European cybersecurity regulation is entering a decisive phase, compelling companies to shift from preparation to active compliance. As the Network and Information Systems 2 (NIS2) Directive is implemented across a growing...more
Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more
Companies spent 2025 racing to adopt artificial intelligence (AI). As 2026 begins, the data shows that AI didn’t just create new risks; it also acted as a high-speed searchlight, exposing the infrastructure gaps many...more
Europe’s gateway to the cosmos has stumbled on terrestrial ground, reminding the global research community that the most advanced engineering ambitions remain tethered to fragile digital infrastructures. On December 30, 2025,...more
A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more
Coblentz partner Scott Hall and members of the Coblentz Data Privacy Team presented “2025 Privacy Overview: How to Ensure Compliance and Reduce Business Risk” on October 21, 2025. The team discussed the global and U.S. AI...more
US critical infrastructure has historically been a prime target for threat actors due to the significant and far-reaching consequences of cyberattacks. Today, ongoing geopolitical tensions and escalating global conflict have...more
Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more
Financial regulators including the Securities and Exchange Commission (“SEC”) continued to focus on data protection and cybersecurity issues throughout 2025....more
What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more
New York has officially joined California at the forefront of US artificial intelligence regulation. Governor Kathy Hochul just signed a revised version of the Responsible AI Safety and Education Act (RAISE Act) into law on...more
The Financial Industry Regulatory Authority’s (FINRA) 2026 Annual Regulatory Oversight Report is the most current and comprehensive statement of FINRA’s priorities and expectations for member firms. It does not create new...more
Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, virtual CISO at Trace3. Jack Clabby of Carlton Fields and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s...more
Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more
The Data Stream podcast dives deep into the fast-moving currents of data, technology, and the law. Presented by BakerHostetler’s Digital Assets and Data Management (DADM) Practice Group and hosted by Partners David Sherman...more
On Nov. 25, the Securities and Exchange Commission (SEC) announced a settlement with a registered investment adviser (RIA) and broker-dealer (the Adviser) for violations of Regulation S-P and Regulation S-ID. Regulation...more
On December 10, 2025, the National Credit Union Administration announced a new Deregulation Project and issued the first package of proposed rules aimed at streamlining its regulatory framework for federally insured credit...more
Crisis Management Academy - California: Resilience in Action brought together global leaders in emergency management, incident response and legal crisis strategy to explore the evolving landscape of organizational resilience....more
The guidance on integrating AI into OT systems sets expectations for safety, governance and transparency. On December 3, 2025, CISA, the NSA, the FBI and several international cyber authorities released Principles for the...more
As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more
On May 16, 2024, the Securities and Exchange Commission (SEC) unanimously approved amendments to Regulation S-P, which imposes new rules relating to cybersecurity breaches involving investment advisers and broker-dealers....more