No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more
The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more
Every day it seems a new data security breach has occurred, a new “cyber hack” is in the news…making us run to our phones, computers, bank accounts, you name it, to see if we could be the “one” affected. As a result, more and...more
The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more
There is a significant nexus between data privacy and security and e-discovery that grows more pronounced as the volume of data generated multiplies exponentially and the ability of e-discovery tools to collect and process...more
Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more