The National Labor Relations Board (NLRB) has continued its assault on businesses and their ability to legitimately protect their computer systems and information against unauthorized non-business use by employees. A few weeks ago, I wrote 3 Important Points on Computer Policies in which I stressed (1) why your company must have them but (2) that…
Tag: Information security
Cyber Law Update on #DtSR Podcast with Los, Santarcangelo and Tuma
Listen to the Podcast / Join the #DtSR Discussion on Twitter Shawn Tuma was a guest the Down the Security Rabbithole podcast where he and hosts Rafal Los (@Wh1t3Rabbit) and Michael Santarcangelo (@Catalyst) discussed recent events in the world of cyber law.
The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks
What is foreseeable is that cyber attacks often are not. A few years ago the Sony Pictures Entertainment (SPE) hack turned on its head the business world that was already trying to come to grips with the Target, Home Depot, Neiman Marcus, and many other data breaches. There was one thing about the SPE breach…
1 Step to Improve Your Company’s Cybersecurity Today
THE ANSWER: The answer is at the bottom, click here to see it now. Cybersecurity is sounding more and more like the magical mystical snake oil elixir of the new millennium. And, for good reason. Everybody is selling the miracle cure, the one tool that will fix everything, and they are doing so with scare…
Law Firm Cybersecurity: I Hate to Say I Told You So But …
Hey! Any chance you’ve heard anything in the news lately about law firms being under cyber attack? If not, first, crawl out from under that rock; second, take a look at these articles. Wow. Can you believe it? Law firms? Under cyber attack? What is this world coming to?
Apple’s Legal Response in Less Than 300 Words #AppleVsFBI
On February 25, 2016, Apple filed its Motion to Vacate the Court Order requiring it to assist the government. Here is a summary of Apple’s *legal arguments* in its Motion to Vacate in less than 300 words: The government wants Apple to help it circumvent the encryption on a device. Congress has examined the issue and…
The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI
On December 6, 2015, FBI investigators reset the password of Farook’s iCloud account, taking what it believed was the logical next step to gain access to the iCloud backup data. Turns out, that was the wrong move. The phone had not been backed up in nearly 2 months and, had FBI not reset the password,…
Making Sense of #AppleVsFBI Issues: #DtSR Podcast
The USA v. Apple battle is one of the hottest issues currently being debated in cybersecurity, privacy, law enforcement, and perhaps even, water coolers in offices around the country. What the debate is lacking in substantive, factually-based, well-reasoned analysis, it certainly makes up for in passion and strong opinions. If you are not convinced, spend…
UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register
The law develops by the process of incrementalism. That is, it is a slow, gradual development, step by tiny step. In the United States, judicial decisions that fill the gaps in between the constitutional and statutory law and helps those bodies of law evolve. Each case sets a precedent, or foundation, upon which the reasoning for…
The #1 Reason NIST Cybersecurity Framework is Becoming the Standard
An article in eCommerce Times offers a well-reasoned argument for why the NIST (National Institute of Standards and Technology) Cybersecurity Framework is the guiding force in shaping the United States’ federal cybersecurity strategy: NIST Risk-Assessment Framework Shapes Federal Cybersecurity Strategy You should read it — but only after you read the following explanation because it is…
You must be logged in to post a comment.