Customers and the public expect a very quick response to a data breach — within a matter of a few days. That is the new standard. If your business is not prepared ahead of time for such a response, it will be impossible. Your business needs a response plan in place with all of the key…
Tag: Data Privacy
Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn
Guest Post by Debbie Fletcher There are two possible conversations that could be kicked off by the news of the major data breach at Excellus Blue Cross Blue Shield in which more than 10 million customer accounts were exposed. The first possible conversation is about internet security and what businesses and organizations of all sizes…
Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)
Wow, this article seriously just made my day. I will apologize in advance to my friend and CSO writer and Michael Santarcangelo (@catalyst), but this may very well be my favorite article — anywhere — of all time! And, thank you, Tom Hulsey (@TomHulsey), for sharing it with me! As for you, Ms. Kacy Zurkus (@KSZ714), all I can…
Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water
“You don’t drown from falling into the water, you drown from not getting out.” Think about that — and think about how that applies to cyber security and data breach issues facing companies in today’s cyber world. Here, in my first ever video blog post, I explain this issue with more detail.
Bleak Cybersecurity Future: Data Breaches on Track to Cost Companies $2.1 Trillion
I recently posted about how corporate general counsel now view cybersecurity as a top 3 concern. At this rate, it will soon be their #1 concern. A recent article in Corporate Counsel gives several reasons for why this problem will only continue to increase in volume, expense, and overall risk to companies: Companies continue to move…
Fifth Amendment Permits Police To Force Users to Unlock iPhones With Fingerprints, But Not Passcodes
The Fifth Amendment does not prohibit the police from forcing users to provide a fingerprint to unlock a mobile device but it does prohibit them from forcing users to provide a passcode. This was the ruling of a District Court in Virginia. The court’s rationale is that the Fifth Amendment does not protect against providing physical or…
Podcast: #DtR Episode on Lines in the Sand on “Security Research”
You really need to hear this podcast where we draw lines in the sand staking out what is — and what is not — security research. The #DtR Gang [Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst)] invited me to tag along for another episode of the Down the Security Rabbit Hole podcast. Also joining us for this episode were…
Yes, I will mention this post in tomorrow’s seminar on data breach! “Who’s Gonna Get It?”
This is one of my favorite and my most popular posts ever — and you better believe I will find a way to mention it to this group of CEOs to help them understand why it is important to take seriously the data security threat! Data Breach – Who’s Gonna Get It? | business cyber…
Podcast: DtR NewsCast of Hot Cyber Security Topics
I had the pleasure of joining the DtR Gang for another podcast on Down the Security Rabbit Hole and, as usual with this bunch, it was more fun than anything — but I learned a lot as well. Let me just tell you, these guys are the best around at what they do and they’re really…
Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?
Today I had a blast doing a podcast on the CFAA, Shellshock, and cyber security research with Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst) — in fact, we had so much fun that I suspect Raf had quite a time trying to edit it! The starting point for our discussion was a recent article…
You must be logged in to post a comment.