You already know what a threat hacking and data breaches are to your business, right? Good. In that case, you will appreciate the following post from my friends at SpearTip about cyber counterintelligence. Here’s a little teaser: If your organization is not yet retaining a provider that specializes in this technique, referred to as “Cyber…
Tag: data security
Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches
Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks…
Law360 article quotes Shawn Tuma on data privacy significance of U.S. v. Cotterman
BrittonTuma partner Shawn Tuma was quoted extensively about last weeks’ United States v. Cotterman opinion in a recent Law360.com article titled “9th Circ. Pioneers Laptop Search Limits in Border Case“. Here are excerpts of what Tuma had to say: “The court is raising the level of the expectation of privacy in data closer to that of someone’s…
Podcast Discussing Data Privacy and Information Security Implications of United States v. Cotterman – Now Available!
You can now listen to the podcast for Courts Showing Greater Respect for Data Privacy – United States v. Cotterman. Click HERE! For a recap, here is my discussion of this podcast and who participated: I finished a fantastic Skype discussion of the Cotterman opinion with with Rafal Los (@Wh1t3Rabbit) and Mike Schearer (@theprez98). As you may recall from The Law and…
Courts Showing Greater Respect for Data Privacy – United States v. Cotterman
TAKEAWAY: Data privacy is gaining respect within the judiciary, as it should because in many ways, data is the new currency and is worthy of protection. On March 8, 2013 the Ninth Circuit Court of Appeals (en banc) handed down a watershed case with significant privacy implications: United States v. Cotterman, No. 09-10139 (9th Cir. Mar. 8,…
The Law and the Hacker – Podcast on the Computer Fraud and Abuse Act
Not too long ago I had a nice visit with Rafal Los (@Wh1t3Rabbit) who is otherwise known as the Chief Security Evangelist for HP and blogs at Following the Wh1t3Rabbit – Practical Enterprise Security. Raf is one dude you really need to follow if you’re interested in #infosec. Anyway, our discussion was centered around the Computer Fraud and Abuse…
Responsiveness and Responsibility Are Considered in Assessing Data Breach Fines
About a year and a half ago I wrote a post titled Data Breach – Who’s Gonna Get it? where I made the point that, much like with Ford’s “bean counting” with the Pinto deaths back in the ’70s, companies that were aware of the risk of data breach but did not act responsibly were…
Have you ever tried to physically destroy a hard drive?
I have. It is not easy. You would not believe how hard it was to do just this much damage to them.
Is Your Mobile Device Secure? Find Out With the FCC’s New Tool
Data security is a hot issue right now. Given the increasing popularity and prevalence of mobile devices combined with their ability to easily store and access so much of our sensitive data, mobile device security is even hotter. The Federal Communications Commission (FCC) also recognizes the importance of this issue and now offers a free tool…
Data Breach – Who’s Gonna Get It?
The message–that’s what I’m talking about–who’s gonna get the message first? Data breaches, hacking, and privacy are one of the biggest news stories for 2011 and we are just just barely through the first half of the year. By now even the most zoned-out among us should have heard of the hacking that led to…
You must be logged in to post a comment.