See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
Tag: Information security
WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence
For most Americans, the WikiLeaks Vault7 release of the CIA’s hacking tools, techniques, and capabilities has created quite a conundrum. Here is how I see it: Cyber has become the primary weapon for warfare, revolutions, and politics. As a nation, those responsible for protecting our nation must maintain superiority in that realm vis-a-vis other nations,…
Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day!
What better way is there to celebrate Data Privacy Day than by learning more about the most recent list of Cybersecurity & Data Privacy Law Trailblazers as published by the National Law Journal? If you are so inclined, here you go: Trailblazers!
Happy Data Privacy Day!
WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future…
New York Cybersecurity Regulations Delayed, Being Revised
Photo Credit: Photo Credit: Marco Verch Licensed under Creative Commons Attribution 2.0 (no changes were made to the image) https://creativecommons.org/licenses/by/2.0/deed.en The New York Department of Financial Services has pushed back the effective date of its Cybersecurity Regulations from January 1, 2017 to March 1, 2017. This is to give the NYDFS time to significantly revise the proposed Cybersecurity…
7 Strategies To Win the Cyber “Space Race” – Cybersecurity Policy Ideas for Trump Administration
“To truly make America safe, we must make cybersecurity a major priority for both the government and the private sector.” -Donald Trump Taking a page from the “avoidance of disaster handbook,” the article below sets out 7 strategies that both your company (and the government of the United States) could pursue to better protect its…
Why is Healthcare Data So Valuable to Cyber Criminals?
Healthcare data is one of the most desirable forms of data for cyber criminals to steal because its value on the cyber black market — the Dark Web — is much higher than most other forms of data. While there are several reasons for this, the recent study Your Life, Repackaged and Resold: The Deep…
Cybersecurity Legal Issues: What you really need to know (slides)
Shawn Tuma delivered the presentation Cybersecurity Legal Issues: What you really need to know at a Cybersecurity Summit sponsored by the Tarleton State University School of Criminology, Criminal Justice, and Strategic Studies’ Institute for Homeland Security, Cybercrime and International Criminal Justice. The presentation was on September 13, 2016 at the George Bush Institue. The following are the slides…
Brazzers porn hack: more than just account holders exposed–what does this mean for your company?
We have been observing an evolution in hackers’ tactics from going after data that could be directly monetized, such as payment card data, to going after data that can be monetized indirectly through extortion, such as the Ashley Madison data. The hack of Brazzers porn site is similar to the Ashley Madison hack in that the…
You must be logged in to post a comment.