No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more
When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more
Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more
An unknown intruder was able to access team communication platform HipChat last weekend, allowing access to the account information of users, including email addresses, hashed passwords and names. There is also a chance that...more
I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more
A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more
With social media pervading all facets of society (no less than 67 percent of Americans are regular users), businesses have long been concerned with their employees’ potentially detrimental social media activities. As these...more
Four pieces of legislation intended to improve online privacy and protections for Delaware residents were signed into law by Governor Jack Markell on August 7, 2015. Collectively, this legislation will impact a broad range of...more
Effective July 1, 2015, employers in Virginia will have to comply with a new law limiting their access to employees’ and applicants’ social media accounts. The new law prohibits employers from requiring employees or...more
All Tennessee employers and their agents must now comply with the “Employee Online Privacy Act of 2014,” a new law that prohibits employers from asking their employees for their usernames and passwords to social media sites,...more
..In-tweet purchases. Twitter is testing the ability for its users to make purchases directly from tweets. The popular social network is working with a number of sellers, nonprofits and artists—as well as a small handful of...more
The innovative folks at Zappos have eschewed the traditional job application/interview/job offer process for a social-media-driven process on a Zappos platform. While very up-to-date, does this push the envelope to the point...more
Two new laws governing the ability of school authorities to obtain passwords to and information from personal social networking websites of employees and students go into effect on January 1, 2014. The definition of social...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more