Does the U.S. Need a Data Protection Authority? (a few of my thoughts)

I had a wonderful discussion about privacy in the US vis-a-vis privacy in the EU with Katherine Teitler (@katherinert15) in connection with her MIS Training Institute article Does the U.S. Need a Data Protection Authority? As with most things, I do not propose to have all of the answers. In fact, in our hour or …

April Fools’ Meme Illustrates Privacy Difference Between Opt-In and Opt-Out

WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence

For most Americans, the WikiLeaks Vault7 release of the CIA’s hacking tools, techniques, and capabilities has created quite a conundrum. Here is how I see it: Cyber has become the primary weapon for warfare, revolutions, and politics. As a nation, those responsible for protecting our nation must maintain superiority in that realm vis-a-vis other nations, …

WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?

In the wake of WikiLeaks’ Vault7 release of documents revealing the CIA’s hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming “the Russians” given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent “Russians.” See: “SHAME HACKING” …

“Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?

But it’s the Russians! The ubiquitous Russians are at it again, or, so we are being told. You know, the Russian hackers who are everywhere, doing everything nefarious in the world, and victimizing poor little helpless “us” here in the United States . . . BREAKING!  Wikileaks: CIA ‘Stole’ Russian Malware, Uses It to ‘Misdirect Attribution’ …

David Beckham’s Exposed Emails Exemplify Shame Hacking Threat

Hackers have obtained David Beckham’s embarrassing emails from his advisors in an extortion plot in which the advisors were told “pay up or we’ll release emails,” according to a recent news report. When the advisors refused to pay the £1million demand, the hackers released the emails. This is yet another example of what I call shame hacking, a topic …

Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day!

What better way is there to celebrate Data Privacy Day than by learning more about the most recent list of Cybersecurity & Data Privacy Law Trailblazers as published by the National Law Journal? If you are so inclined, here you go: Trailblazers!

Happy Data Privacy Day!

WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future …

Improving Your Cybersecurity Plan, Explained by Paul Ferrillo in WSJ

The Wall Street Journal did an interview of my friend, collaborator, prolific author, and the the original Cyber Patriot, Paul Ferrillo to discuss how companies can make their cybersecurity plan better. Here is the full article: Making Your Cybersecurity Plan Better Paul and I are both firm believers in focusing on the basics so that …

How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)

WFAA TV’s Jane McGarry interviewed Shawn Tuma on the Good Morning Texas show to discuss how you can protect yourself from cell phone cyber threats and identity theft (Jan. 18, 2017) (WFAA LINK). https://www.youtube.com/watch?v=SAP6QG5FPPU