No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more
Welcome to our ninth 2024 issue of Decoded - our technology law insights e-newsletter. How are States Using Generative Artificial Intelligence? and Employee AI Adoption Cools Globally - Why this is important: As...more
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
On August 3, British researchers published an Institute of Electrical and Electronics Engineers (IEEE) article explaining how the sounds of typing on a laptop keyboard can be heard and that deep learning can be used to...more
As the rate of international cyberattacks increases, it is essential that corporations that collect and store their customers’ personal data keep it safe from breaches. But even large corporations can be slow to act in order...more
CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more
The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more
As businesses continue to digitise their assets and operations, the need to continually assess IT infrastructure and the technical measures in place to safeguard key information assets and data becomes ever more important....more
So this week’s blog article takes a page from my very own “smart” home devices. Monday morning at about 3:42 a.m. our entire household woke up because every “smart” lightbulb in the house came on at the same time! It was a...more
The “security principle” under the General Data Protection Regulation (GDPR) requires that organizations process personal data securely by means of “appropriate” technical and organizational measures....more
The UK government recently released a policy paper outlining proposed requirements for makers of Internet of Things (IoT) devices to take certain actions to better protect IoT devices from growing cybersecurity threats....more
Businesses should take steps to protect usernames, email addresses, passwords, and security questions and answers. A key issue in determining whether notification is required following a data breach is whether...more
You and your business may use the cloud vendor Dropbox (www.dropbox.com) to store or transfer files, work-related documents, or personal information (or may have used it to transfer such data in the past). ...more
You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more
The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more
Connecticut has joined a list of twenty-one states with a statute designed to preserve the privacy of personal online accounts of employees and limit the use of information related to such accounts in employment...more