This morning I am doing radio interviews as a Fox News Radio contributor. My topic? The DEFCON Voting Village demonstration of hacking voting machines that have been, or may currently be, used in US elections. Here are a couple of the news stories if you are unfamiliar: Hacking a US electronic voting booth takes less than…
Tag: data security
Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance,…
Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?
Does the HIPAA Breach Notification Rule apply to all Covered Entities and Business Associates, Even Smaller Ones? To many of you reading this post this question seems ridiculous. You know the answer. However, I get asked this question so frequently that I decided to answer it with a blog post to save time next time…
Critical Steps Companies Must Take to Comply with New York’s Cybersecurity Rules – Ethical Boardroom
New York’s Cybersecurity Regulations went into effect on March 1, 2017 and their impact could reach farther than you think — including to small and mid-sized companies that do not do business in New York and are not in the financial services industries. And, they require direct involvement by the Board of Directors. Is your…
WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence
For most Americans, the WikiLeaks Vault7 release of the CIA’s hacking tools, techniques, and capabilities has created quite a conundrum. Here is how I see it: Cyber has become the primary weapon for warfare, revolutions, and politics. As a nation, those responsible for protecting our nation must maintain superiority in that realm vis-a-vis other nations,…
Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing
Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it…
WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?
In the wake of WikiLeaks’ Vault7 release of documents revealing the CIA’s hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming “the Russians” given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent “Russians.” See: “SHAME HACKING”…
Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day!
What better way is there to celebrate Data Privacy Day than by learning more about the most recent list of Cybersecurity & Data Privacy Law Trailblazers as published by the National Law Journal? If you are so inclined, here you go: Trailblazers!
Happy Data Privacy Day!
WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future…
You must be logged in to post a comment.