I had the pleasure of joining the DtR Gang for another podcast on Down the Security Rabbit Hole and, as usual with this bunch, it was more fun than anything — but I learned a lot as well. Let me just tell you, these guys are the best around at what they do and they’re really…
Tag: Data Privacy
Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?
Today I had a blast doing a podcast on the CFAA, Shellshock, and cyber security research with Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst) — in fact, we had so much fun that I suspect Raf had quite a time trying to edit it! The starting point for our discussion was a recent article…
Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we!
The point of the article that is the source of the quote below is exactly right: there is no consistency, cohesiveness, or harmony with the cyber crime and data privacy laws. I believe there are several reasons but these are the two that are most prominent: The cyber crime and data privacy laws are a patchwork collection…
3 Steps the C-Suite Can Take to Strengthen Cyber Security
The C-Suite is ultimately responsible for failures of a company’s cyber security. A recent example of this is how Target’s CEO, CTO, and several Board Members were pushed out in the wake of its data breach. SEE BELOW FOR EVENT REGISTRATION! This puts leaders in a difficult position. It is almost a statistical certainty that…
Supreme Court: Private Information Is Worthy of Protection, Even on Cell Phones
In Riley v. California the Supreme Court made it clear that people’s private information is worthy of protection, even on their cell phones, in holding that cell phones are generally protected from searches without a warrant. The Supreme Court ruled Wednesday that police cannot go snooping through people’s cell phones without a warrant, in a unanimous…
So, your business has never had a data breach? Have you ever had an employee leave?
TAKEAWAY: Businesses must protect their data from being taken by anyone who is not authorized to have it — insiders and outsiders alike. If their data is taken in a way that is unauthorized, it is a data breach. When a former employee leaves with a thumb drive, Gmail inbox, or Dropbox of your businesses’…
Private Facebook posts are protected by the SCA unless voluntarily provided by friends with access
There may be some notion of privacy in your private Facebook wall but it is at the whim of your 498 friends — is it really? A district court recently determined that Facebook wall posts are covered by the Stored Communications Act if the privacy settings are set to limit access to only friends. However,…
The Indispensability of Cyber Counterintelligence
You already know what a threat hacking and data breaches are to your business, right? Good. In that case, you will appreciate the following post from my friends at SpearTip about cyber counterintelligence. Here’s a little teaser: If your organization is not yet retaining a provider that specializes in this technique, referred to as “Cyber…
Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches
Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks…
Law360 article quotes Shawn Tuma on data privacy significance of U.S. v. Cotterman
BrittonTuma partner Shawn Tuma was quoted extensively about last weeks’ United States v. Cotterman opinion in a recent Law360.com article titled “9th Circ. Pioneers Laptop Search Limits in Border Case“. Here are excerpts of what Tuma had to say: “The court is raising the level of the expectation of privacy in data closer to that of someone’s…
You must be logged in to post a comment.