Hey! Any chance you’ve heard anything in the news lately about law firms being under cyber attack? If not, first, crawl out from under that rock; second, take a look at these articles. Wow. Can you believe it? Law firms? Under cyber attack? What is this world coming to?
Tag: Cybersecurity
What Does the Travelers Case Really Mean for Cyber Insurance?
Watch the video for the explanation or see below for the spolier. SPOLIER ALERT!
FBI Guidance: How to Respond to Ransomware
Spoiler Alert: According to the article below, in a recent podcast the FBI “warned against paying ransoms” and doesn’t like to see companies pay the ransom because, the old law of supply and demand just means that ransomware is more profitable and, therefore, we see more of it.
Why Cybersecurity Incidents Are Legal Events
In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events.
Apple’s Legal Response in Less Than 300 Words #AppleVsFBI
On February 25, 2016, Apple filed its Motion to Vacate the Court Order requiring it to assist the government. Here is a summary of Apple’s *legal arguments* in its Motion to Vacate in less than 300 words: The government wants Apple to help it circumvent the encryption on a device. Congress has examined the issue and…
The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI
On December 6, 2015, FBI investigators reset the password of Farook’s iCloud account, taking what it believed was the logical next step to gain access to the iCloud backup data. Turns out, that was the wrong move. The phone had not been backed up in nearly 2 months and, had FBI not reset the password,…
Making Sense of #AppleVsFBI Issues: #DtSR Podcast
The USA v. Apple battle is one of the hottest issues currently being debated in cybersecurity, privacy, law enforcement, and perhaps even, water coolers in offices around the country. What the debate is lacking in substantive, factually-based, well-reasoned analysis, it certainly makes up for in passion and strong opinions. If you are not convinced, spend…
UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register
The law develops by the process of incrementalism. That is, it is a slow, gradual development, step by tiny step. In the United States, judicial decisions that fill the gaps in between the constitutional and statutory law and helps those bodies of law evolve. Each case sets a precedent, or foundation, upon which the reasoning for…
The #1 Current Cybersecurity Threat to Business in DFW (2/18/16)
Earlier today I attended a monthly committee meeting to discuss the current cybersecurity threat landscape. This is a small group that meets around a conference table, somewhat informally, and consists of members of federal and state law enforcement as well as a few individuals in the private sector who are involved in cybersecurity. Those of…
4 Ways to Engage Executives in Cyber Risk
The CIO Journal has an informative article, 4 Ways to Engage Executives in Cyber Risk, that discusses a handful of ideas that can be helpful for engaging company executives on the issue of cybersecurity risks. Here are the 4 steps it suggests: Host a cyber risk heat-mapping session Establish key risk and performance indicators Simulate…
You must be logged in to post a comment.