5 Key Takeaways from Verizon’s GC on Lessons Learned from Yahoo Deal

A good friend recently shared with me the article Verizon GC on the Lessons Learned from Deal with Yahoo (use Linkedin for paywall access) because he thought it would be valuable information to add to my own cybersecurity knowledge toolbox. Given the experience Verizon’s GC has gained through this process, when he talks about lessons …

Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?

Does the HIPAA Breach Notification Rule apply to all Covered Entities and Business Associates, Even Smaller Ones? To many of you reading this post this question seems ridiculous. You know the answer. However, I get asked this question so frequently that I decided to answer it with a blog post to save time next time …

The Ubiquity of Cyber

Cyber is the weapon of choice for warfare, revolution, espionage, politics, and business. It is ubiquitous. You had better take it seriously. Are you ready?  

Critical Steps Companies Must Take to Comply with New York’s Cybersecurity Rules – Ethical Boardroom

New York's Cybersecurity Regulations went into effect on March 1, 2017 and their impact could reach farther than you think -- including to small and mid-sized companies that do not do business in New York and are not in the financial services industries. And, they require direct involvement by the Board of Directors. Is your …

WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7

See also:  WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS? https://youtu.be/MR1G6JO0is0

WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence

For most Americans, the WikiLeaks Vault7 release of the CIA's hacking tools, techniques, and capabilities has created quite a conundrum. Here is how I see it: Cyber has become the primary weapon for warfare, revolutions, and politics. As a nation, those responsible for protecting our nation must maintain superiority in that realm vis-a-vis other nations, …

Good Article on Cybersecurity Basics

Here is a really good article, written in simple terms, talking about cybersecurity basics: What is Internet Security and Why You Should Know About It - SaferVPN blog

Target Data Breach: What Has It Cost? What Has Insurance Covered?

Target, in a recent document filed with the Securities and Exchange Commission, provided updated information on the financial impact of its 2013 data breach: It now estimates paying $264 million in breach-related costs, ranging from litigation claims to the expenses it experienced for fixing systems and sending out information at the time of the attack …

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it …

WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?

In the wake of WikiLeaks' Vault7 release of documents revealing the CIA's hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming "the Russians" given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent "Russians." See: “SHAME HACKING” …