5 Key Takeaways from Verizon’s GC on Lessons Learned from Yahoo Deal

A good friend recently shared with me the article Verizon GC on the Lessons Learned from Deal with Yahoo (use Linkedin for paywall access) because he thought it would be valuable information to add to my own cybersecurity knowledge toolbox. Given the experience Verizon’s GC has gained through this process, when he talks about lessons [...]

Critical Steps Companies Must Take to Comply with New York’s Cybersecurity Rules – Ethical Boardroom

New York's Cybersecurity Regulations went into effect on March 1, 2017 and their impact could reach farther than you think -- including to small and mid-sized companies that do not do business in New York and are not in the financial services industries. And, they require direct involvement by the Board of Directors. Is your [...]

Cybersecurity Legal Issues: What you really need to know (slides)

Shawn Tuma delivered the presentation Cybersecurity Legal Issues: What you really need to know at a Cybersecurity Summit sponsored by the Tarleton State University School of Criminology, Criminal Justice, and Strategic Studies' Institute for Homeland Security, Cybercrime and International Criminal Justice. The presentation was on September 13, 2016 at the George Bush Institue. The following are the slides [...]

Brazzers porn hack: more than just account holders exposed–what does this mean for your company?

We have been observing an evolution in hackers' tactics from going after data that could be directly monetized, such as payment card data, to going after data that can be monetized indirectly through extortion, such as the Ashley Madison data. The hack of Brazzers porn site is similar to the Ashley Madison hack in that the [...]

D CEO Magazine: Why Cybercriminals Are Targeting Law Firms

Many thanks to attorney and legal scholar extraordinaire John G. Browning (@therealjohnbrow) for quoting Shawn Tuma in his article in this month's D CEO magazine: Why Cybercriminals Are Targeting Law Firms. Please read the full article to hear Tuma's advice to John's questions of why law firms often have poor(er) cybersecurity and what law firms can [...]