The Best Evidence Why Your Company Needs a CISO Before a Data Breach

“The proof is in the pudding,” goes the old saying. When it comes to organizational changes companies make following a data breach, If the proof is in the pudding, then the verdict is clear: companies should hire a Chief Information Security Officer (CISO) before they have a data breach. Why? According to this article in …

Check out my first post on Norse’s DarkMatters > Sony Hack: Where Do We Die First?

Hey everybody, go check out my first post on Norse’s DarkMatters blog — yeah, you know, Norse with the awesome Live Cyber Attack Map! Now that you’re mesmerized by the map, here’s the post and please share it! Sony Hack: Where Do We Die First?

Automakers show more concern for hackers’ efforts to exploit vulnerabilities in car computer systems

Automakers seem to be taking the car hacking issue a lot more seriously. They should be. Over the last few years I have written quite a bit about car hacking and what laws may apply to such cases — such as the Computer Fraud and Abuse Act. Here is a post that references several of those …

Honored to be part of the Team: From 44 Felony Counts to One Misdemeanor, Plea Entered in U.S. v. Salinas CFAA Case

A plea deal has been entered in the case of US v. Salinas. Mr. Salinas’ legal team successfully negotiated an agreement that reduced a 44 felony count indictment down to a single misdemeanor count. Tor Ekeland led Salinas’ legal team and did the heavy lifting on getting this deal done. I am honored that Tor invited …

Dang! “Loss” of Opportunity to Decide Interesting CFAA Issue, But “Loss” Analyisis is Good Too

Plaintiff had interesting claim under the CFAA but couldn’t get there due to that pesky “loss” requirement Does an employer violate the Computer Fraud and Abuse Act by remotely wiping an employee’s personal mobile device that was connected to the employer’s server and contained its data? The United States District Court for the Southern District …

Platform Magazine Quotes Tuma Discussing CyberGard: The Public Relations Side of a Data Breach

Thank you to Platform Magazine for quoting me discussing the PR component of my CyberGard – Business Cyber Risk Protection Program in this forward thinking article about the value of getting public relations on board before your company has a data breach. In a recent post I explained why a data breach response must focus on the …

After this judge’s ruling, do you finally see value in passwords? | CSO Online

Thank you Michael Santarcangelo for quoting me in your excellent article: After this judge’s ruling, do you finally see value in passwords? | CSO Online.

The Art of Cybersecurity: How Sun Tzu Masterminded the Home Depot Data Breach

Sun Tzu taught that, when it comes to the art of cybersecurity, you must be wary of your business associates and other third parties. Why? Have you heard that Home Depot had a data breach? That hackers were able to exfiltrate 56 million payment cards and 53 million customer email addresses from its systems? Did …

Are the Russians Strategically Positioned for Full Scale Cyber War with the US? (apparently they have been since 2011)

Remember this word: Stuxnet Got it? (read more about Stuxnet on p. 145-46 of this article) It is now our turn to have the cyber weapons of war used against us and the Russians are making sure they have the upper hand when the time comes. Stay tuned … A destructive “Trojan Horse” malware program has penetrated …

Fifth Amendment Permits Police To Force Users to Unlock iPhones With Fingerprints, But Not Passcodes

The Fifth Amendment does not prohibit the police from forcing users to provide a fingerprint to unlock a mobile device but it does prohibit them from forcing users to provide a passcode. This was the ruling of a District Court in Virginia. The court’s rationale is that the Fifth Amendment does not protect against providing physical or …