Kevin OKeefe and Shawn Tuma’s Conversation About Lawyers and Blogging at #SBOT17

While at the 2017 State Bar of Texas Annual Meeting, I had the pleasure of visiting with Kevin OKeefe of LexBlog in a Facebook Live conversation where we talked about lawyers, blogging, and the evolution of my cybersecurity and data privacy practice. Check out the video and let us know what you think: https://www.facebook.com/kokeefe/videos/10154705674546696/ Here's …

#CyberAvengers: Ransomware Spreading Like Crazy Worms

Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]

#CyberAvengers: Fixing the Federal IT Mess Before it is Too Late

Read the recent #CyberAvengers article, Fixing the Federal IT Mess Before it is Too Late, on Levick.com or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking to …

New Hacking Technique Revealed, Viruses in Online Video Subtitles

Check Point security group has released information revealing how hackers are now using online video subtitles as a source to transport viruses into personal computers, granting hackers to endless information for very little work. This method of hacking requires a user to do nothing other than opening up their favorite videos online. According to a …

OCR Issues Cyberattack Response Checklist and Infographic

The United States Department of Health and Human Services' Office for Civil Rights has just issued a checklist and infographic to aid healthcare organizations and their vendors in quickly responding to cyberattacks in compliance with HIPAA requirements.

CGTN America interviews Shawn Tuma about #WannaCry #ransomware attacks

CGTN America recently interviewed Shawn Tuma about the WannaCry ransomware attacks. Here is the video: https://youtu.be/PHxXBHCaHpY

#CyberAvengers – Ransomware is Spreading Like Worms: Are You Ready?

As some of you may have noticed online, I have the privilege of being part of the #CyberAvengers -- here's a little more info about the #CyberAvengers and an article we recently published in NextGov.com. Here is the NextGov article: Ransomware is Spreading Like Worms: Are You Ready? The #CyberAvengers are a group of salty …

Webinar: Global reaching Cybersecurity Regulations in New York, will they impact your company?

Now that the WannaCry ransomware has your attention and the attention of everybody else, it is time to start thinking about your company's cybersecurity legal and compliance obligations. Do you know whether your company will be impacted by New York's expansive and global reaching Cybersecurity Regulations? The new Regulations govern many companies that do business …

Does the U.S. Need a Data Protection Authority? (a few of my thoughts)

I had a wonderful discussion about privacy in the US vis-a-vis privacy in the EU with Katherine Teitler (@katherinert15) in connection with her MIS Training Institute article Does the U.S. Need a Data Protection Authority? As with most things, I do not propose to have all of the answers. In fact, in our hour or …

Does Board Oversight of Cybersecurity Mean Directors Must Become Cybersecurity Experts?

Does the board of directors' duty of oversight over their companies' cybersecurity require the individual directors to become experts on cybersecurity? That is a fair question and one that I've seen many people have difficulty understanding. The answer is "no," as explained by Michael Santarcangelo (@catalyst) in his CSO article Why the board needs security leaders …